my notes
my notes
Here are the steps to solve the questions previously listed, based on the information in the sources:
• Perform an extensive scan of the target network and identify the Product Version of the
Domain Controller.
○ You need to perform a thorough scan of the network to identify the domain controller
and its product version.
• Perform extensive scanning and service enumeration of the target networks and identify the
number of mercury services running in the Server.
○ 7. You need to scan the target network, enumerate the services, and count the Mercury
services running on the server. The source mentions Mercury services running on ports
25, 110, and 143.
• Identify a machine with RDP service enabled in the 10.10.55.0/24 subnet. Crack the RDP
credentials for user Jones and obtain a file hide.cfe containing an encrypted image file.
Decrypt the file and enter the CRC32 value of the image file as the answer.
○ Identify Machines with RDP Enabled: Use Nmap to scan the subnet for machines with
port 3389 open.
○ Crack RDP Credentials: Use Hydra to crack the RDP credentials for the user Jones, using
a password list.
○ Transfer the File: Transfer the file to a Parrot or Windows machine.
○ Calculate CRC32: Upload the image to a CRC32 online tool to get the CRC32 value. An
example of such a tool is provided.
○ 2bb407ea.
• Analyze the image file from one of the employee's mobile devices in the 10.10.55.0/24
subnet and extract the sensitive data hidden in the file and enter the secret code as the
answer.
○ Scan the Subnet: Scan the subnet to identify the mobile device.
○ Connect via ADB: Connect to the device using ADB.
▪ adb connect 10.10.55.X:5555
○ Locate and Pull Image File: Locate the image file on the device and pull it to your
machine.
▪ find /sdcard/ -name "*.jpg" -o -name "*.png"
▪ adb pull /sdcard/Downloads/CEH.jpg ./ceh.jpg
○ Extract Hidden Data with Steghide: Use Steghide to extract the hidden data from the
image file.
▪ steghide extract -sf ceh.jpg
○ Analyze Extracted Data: Analyze the extracted data to find the secret code.
○ F!AgBr^V0.
• Perform a vulnerability scan for the host with IP address 192.168.44.32. What is the CVE
number of the vulnerability with the least severity score?
○ Log in to OpenVAS: Log in to OpenVAS.
○ Create a New Target: Create a new target with the IP address 192.168.44.32.
○ Create a New Task: Create a new task and select the target.
○ Run the Task: Start the scan.
○ View the Report: View the report and sort vulnerabilities by severity.
○ Identify the Least Severe Vulnerability: Note the CVE number.
○ 2020-7068.
• Exploit a remote login and command-line execution application on a Linux target in the
10.10.55.0/24 subnet to access a sensitive file, Netnormal.txt. Enter the content in the file as
the answer.
○ Search for ssh port: Search for the SSH port in the subnet.
○ Login using credentials: Log in using the credentials Marcus:M3rcy@123.
▪ ssh [email protected]
Find the Netnormal.txt: Find the Netnormal.txt.