{"id":136,"date":"2025-11-24T01:48:02","date_gmt":"2025-11-24T01:48:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/?p=136"},"modified":"2025-11-24T01:48:07","modified_gmt":"2025-11-24T01:48:07","slug":"cyse-301-assignment4-windows-xp-exploit","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/2025\/11\/24\/cyse-301-assignment4-windows-xp-exploit\/","title":{"rendered":"CYSE 301 Assignment4: Windows XP Exploit"},"content":{"rendered":"\n<p>Assignment 4: Ethical Hacking<\/p>\n\n\n\n<p>At the end of this module, each student must submit a report indicating the completion of the following<\/p>\n\n\n\n<p>tasks. Make sure you take screenshots as proof.<\/p>\n\n\n\n<p>You need to power on the following VMs for this assignment.<\/p>\n\n\n\n<p>\u2022 Internal Kali (Attacker)<\/p>\n\n\n\n<p>\u2022 pfSense VM (power on only)<\/p>\n\n\n\n<p>\u2022 Windows XP, Windows Server 2022, or Windows 7 (depending on the subtasks).<\/p>\n\n\n\n<p>Task A. Exploit SMB on Windows XP with Metasploit (20 pt, 2pt each)<\/p>\n\n\n\n<p>In this task, you need to complete the following steps to exploit SMB vulnerability on Windows XP.<\/p>\n\n\n\n<p>1. Run a port scan against the Windows XP using the nmap command to identify open ports and<\/p>\n\n\n\n<p>services.setset<\/p>\n\n\n\n<p>2. Identify the SMB port number (default: 445) and confirm that it is open.<\/p>\n\n\n\n<p>3. Launch Metasploit Framework and search for the exploit module: ms08_067_netapi<\/p>\n\n\n\n<p>4. Use ms08_067_netapi as the exploit module and set meterpreter reverse_tcp as the payload.<\/p>\n\n\n\n<p>5. Use 5525 as the listening port number. Configure the rest of the parameters. Display your<\/p>\n\n\n\n<p>configurations and exploit the target.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"503\" src=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt1-1024x503.png\" alt=\"\" class=\"wp-image-138\" srcset=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt1-1024x503.png 1024w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt1-300x147.png 300w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt1-768x377.png 768w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt1-750x369.png 750w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt1.png 1044w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>6. [Post-exploitation] Execute the screenshot command to take a screenshot of the target machine<\/p>\n\n\n\n<p>if the exploit is successful.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"710\" src=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt2-1024x710.png\" alt=\"\" class=\"wp-image-137\" srcset=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt2-1024x710.png 1024w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt2-300x208.png 300w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt2-768x533.png 768w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt2-750x520.png 750w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt2.png 1109w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>7. [Post-exploitation] In the meterpreter shell, display the target system\u2019s local date and time.<\/p>\n\n\n\n<p>8. [Post-exploitation] In the meterpreter shell, get the SID of the user.<\/p>\n\n\n\n<p>9. [Post-exploitation] In the meterpreter shell, get the current process identifier.<\/p>\n\n\n\n<p>10. [Post-exploitation] In the meterpreter shell, get system information about the target.<\/p>\n\n\n\n<p>*7-10 are all in one screenshot<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"580\" src=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt3-1024x580.png\" alt=\"\" class=\"wp-image-139\" srcset=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt3-1024x580.png 1024w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt3-300x170.png 300w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt3-768x435.png 768w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt3-750x425.png 750w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt3.png 1342w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Task B. Exploit EternalBlue on Windows Server 2022 with Metasploit (10 pt)<\/p>\n\n\n\n<p>In this task, try to use the same steps as shown in the video lecture to exploit the EternalBlue<\/p>\n\n\n\n<p>vulnerability on Windows Server 2022. You may or may not establish a reverse shell connection to the<\/p>\n\n\n\n<p>Windows Server 2022 using the same method as hacking Windows Server 2008. Document your steps and<\/p>\n\n\n\n<p>show me your results.<\/p>\n\n\n\n<p>You won\u2019t lose points for a failed reverse shell connection. But you will lose points for incorrect<\/p>\n\n\n\n<p>configurations, such as putting the wrong IP address for LHOST\/RHOST, etc.<\/p>\n\n\n\n<p>Task C. Exploit Windows 7 with a deliverable payload (70 pt).<\/p>\n\n\n\n<p>In this task, you need to create an executable payload with the required configurations below.<\/p>\n\n\n\n<p>1. Once your payload is ready, you should upload it to the web server running on Kali Linux and,<\/p>\n\n\n\n<p>download the payload from Windows 7, then execute it on the target to make a reverse shell. Of<\/p>\n\n\n\n<p>course, don&#8217;t forget to configure your Metasploit on Kali Linux before the payload is triggered on<\/p>\n\n\n\n<p>the target VM. (10 pt).<\/p>\n\n\n\n<p>The requirements for your payload are :<\/p>\n\n\n\n<p>\u2022 Payload Name: Use your MIDAS ID (for example, svatsa.exe) (5pt)<\/p>\n\n\n\n<p>\u2022 Listening port: 5525 (5pt)<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"752\" height=\"480\" src=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt4.png\" alt=\"\" class=\"wp-image-140\" srcset=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt4.png 752w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt4-300x191.png 300w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt4-750x479.png 750w\" sizes=\"(max-width: 752px) 100vw, 752px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"781\" height=\"191\" src=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt5.png\" alt=\"\" class=\"wp-image-141\" srcset=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt5.png 781w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt5-300x73.png 300w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt5-768x188.png 768w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt5-750x183.png 750w\" sizes=\"(max-width: 781px) 100vw, 781px\" \/><\/figure>\n\n\n\n<p>[Post-exploitation] Once you have established the reverse shell connection to the target Windows 7, complete the following tasks in your meterpreter shell:<\/p>\n\n\n\n<p>2. Execute the screenshot command to take a screenshot of the target machine if the exploit is<\/p>\n\n\n\n<p>successful. (10 pt)<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"697\" src=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt6-1024x697.png\" alt=\"\" class=\"wp-image-142\" srcset=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt6-1024x697.png 1024w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt6-300x204.png 300w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt6-768x523.png 768w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt6-750x510.png 750w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment4_pt6.png 1127w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>3. Create a text file on the attacker Kali named &#8220;YourMIDAS.txt&#8221; (replace YourMIDAS with your university MIDAS ID) and put the current timestamp in the file. Upload this file to the target&#8217;s desktop. Then, log in to Windows 7 VM and check if the file exists. You need to show me the command that uploads the file. (10 pt)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Assignment 4: Ethical Hacking At the end of this module, each student must submit a report indicating the completion of the following tasks. Make sure you take screenshots as proof. You need to power on the following VMs for this assignment. \u2022 Internal Kali (Attacker) \u2022 pfSense VM (power on only) \u2022 Windows XP, Windows &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/2025\/11\/24\/cyse-301-assignment4-windows-xp-exploit\/\">Continue reading<\/a><\/p>\n","protected":false},"author":25850,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[8],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/posts\/136"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/users\/25850"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/comments?post=136"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/posts\/136\/revisions"}],"predecessor-version":[{"id":143,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/posts\/136\/revisions\/143"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/media?parent=136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/categories?post=136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/tags?post=136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}