3.3.3. LAB PRACTICE - MSF Hacking Windows10 Lab1 v1-1
3.3.3. LAB PRACTICE - MSF Hacking Windows10 Lab1 v1-1
HACKING WINDOWS 10
VULNERABILITY EXPLOITATION WITH
METASPLOIT & ARMITAGE
www.networkwalks.com
PRACTICE LAB
HACKING Windows10
Vulnerability exploitation with Metasploit & Armitage
BACKGROUND:
METASPLOIT FRAMEWORK (MSF) is a collection of Cybersecurity & Pentesting tools. It is used to create
payloads. It is an open-source framework & its Community/FW version is free to use. It is an essential tool for
both attackers and defenders. Metasploit is pre-installed in the Kali Linux operating system.
Metasploit was created by H. D. Moore in 2003 using Perl. Then, in 2007, it was rewritten in Ruby. In 2009, it
was bought by Rapid7 & it is currently owned by Rapid7.
Metasploit currently has around 600 payloads (Meterpreter, CommandShell, ..) & around 2000 exploits (for
Windows, Android, Linux, …).
ARMITAGE is a GUI front-end tool for Metasploit that shows targets graphically, recommends exploits and
shows the advanced capabilities of the framework.
TASKS
TASK 2 Gain the Meterpreter shell access. Run sysinfo command to find
the system information through shell access.
www.networkwalks.com
SOLUTION
TASK 1
www.networkwalks.com
Step7. Scan your network subnet through the built-in scanner of Armitage:
Note:
You can also follow the
Nmap lab to scan your
relevant network OR use
the built-in Nmap
scanner in ARMITAGE
as shown in this lab.
Step8. Enter the range of your network to scan (we are using 10.0.0.0/24 according to
lab setup)
In this lab, we are using 10.0.0.0/24 network subnet. You can use your range of subnet where attacker & victim machines are in.
Step9. Identify the victim/target Windows10 machine after the scan is complete:
www.networkwalks.com
Step10. From the left-hand pane, expand & double-click on:
payload >windows > meterpreter_reverse_tcp
Step12. Save the output payload file on your desktop in Kali Linux:
www.networkwalks.com
Step13. The payload will be saved on your desktop, as shown below:
To avoid security issues on main PC, we can zip the file before transferring to victim:
Note:
For this lab practice,
we can transfer the
payload by simple
copy/paste.
But in real world
practice, we transfer
the payload through
email, usb, whatsapp
or any other means
to the victim.
www.networkwalks.com
Step15. Run the reverse_tcp again to start listener/handler on Attacker Kali Linux
Machine. Select same port 444 & choose multihandler this time in the Output field.
Then click on Launch:
www.networkwalks.com
Step17. As soon as the victim opens the malicious file, session is created with
attacker (there is under-attack sign on victim in Armitage which means that this
machine has been hacked):
www.networkwalks.com
TASK 2
Step2. A new Meterpreter tab appears. Type sysinfo command to view the system
details of the victim system, as shown below.
This confirms that the target/victim system has been hacked now & it is under
control of the attacker.
www.networkwalks.com
TASK 3
Step1. Right-click on the target host & navigate to Meterpreter1>Explore>Browse
Files, as shown below.
Step2. A new Meterpreter File tab appears which shows the victim’s current working
directory. This further confirms that the target/victim system has been hacked now
& it is in control of the attacker. Hacker can now create/delete any files, create
folders & much more.
-End-
www.networkwalks.com
EXTRA REFERENCES & TIPS
• As shown in this lab, we can also explore various other options with Metasploit
including:
✓ View Webcam
✓ Listen to the Microphone
✓ Remote Desktop (Desktop VNC)
✓ Log Keystrokes
✓ Escalate Privileges (to steal tokens etc)
• Metasploit was created by H. D. Moore in 2003 using Perl. Then, in 2007, it was
rewritten in Ruby. In 2009, it was bought by Rapid7 & it is currently owned by Rapid7.
www.networkwalks.com
© All Rights are reserved, Networkwalks Academy
Contact us for your Cybersecurity, Cisco CCNA, Linux, Python Programming & IT Training today [email protected]
Your Technical Questions, comments & suggestions are always welcomed.
www.networkwalks.com