{"id":590,"date":"2024-11-27T01:08:17","date_gmt":"2024-11-27T01:08:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/?page_id=590"},"modified":"2024-11-27T01:08:17","modified_gmt":"2024-11-27T01:08:17","slug":"ethical-hacking","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/ethical-hacking\/","title":{"rendered":"Ethical Hacking"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">&nbsp;<\/h1>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Old Dominion University<\/h1>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">CYSE 301 Cybersecurity Techniques and Operations<\/h1>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Assignment 4: Ethical Hacking (v3)<\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Edwin C Wells IV<\/h2>\n\n\n\n<h1 class=\"wp-block-heading\">Task A.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <br>Exploit SMB on Windows XP with Metasploit<\/h1>\n\n\n\n<p>In this task, you need to complete the following steps to exploit SMB vulnerability on Windows XP.<\/p>\n\n\n\n<ol>\n<li>Run a port scan against the Windows XP using nmap command to identify open ports and services.<\/li>\n\n\n\n<li>Identify the SMB port number (default: 445) and confirm that it is open.\n<ol>\n<li>Used command nmap 192.168.10.0\/24 -p- -sV to find open ports and services in the 192.168.10.0\/24 subnet<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-42.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-42.png\" alt=\"\" class=\"wp-image-592\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-42.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-42-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-42-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-42-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Launch Metasploit Framework and search for the exploit module: <strong><em><u>ms08_067_netapi<\/u><\/em><\/strong><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-43.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-43.png\" alt=\"\" class=\"wp-image-593\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-43.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-43-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-43-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-43-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Use ms08_067_netapi as the exploit module and set meterpreter reverse_tcp as the payload.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-44.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-44.png\" alt=\"\" class=\"wp-image-594\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-44.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-44-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-44-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-44-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Use <strong><em><u>4498<\/u> <\/em><\/strong>as the listening port number. Configure the rest of the parameters. Display your configurations and exploit the target.\n<ul>\n<li>Set the rhosts, lhost, and lport with set commands<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-45.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-45.png\" alt=\"\" class=\"wp-image-595\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-45.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-45-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-45-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-45-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Successfully exploited and established a session<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-46.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"840\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-46.png\" alt=\"\" class=\"wp-image-596\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-46.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-46-300x253.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-46-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-46-356x300.png 356w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>[Post-exploitation] Execute the screenshot command to take a screenshot of the target machine if the exploit is successful.\n<ul>\n<li>Used screenshot to take a screenshot<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-47.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-47.png\" alt=\"\" class=\"wp-image-597\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-47.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-47-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-47-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-47-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Image taken<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-48.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-48.png\" alt=\"\" class=\"wp-image-598\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-48.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-48-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-48-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-48-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>[Post-exploitation] In meterpreter shell, display the target system\u2019s local date and time.\n<ul>\n<li>Used localtime command\n<ul>\n<li>Time was 2023-10-19 16:08:33 EST<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>[Post-exploitation] In meterpreter shell, get the SID of the user.\n<ul>\n<li>Used getsid command\n<ul>\n<li>SID : S-1-5-18<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>[Post-exploitation] In meterpreter shell, get the current process identifier.\n<ul>\n<li>Used getpid command\n<ul>\n<li>Pid: 1168<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>[Post-exploitation] In meterpreter shell, get system information about the target.\n<ul>\n<li>Used sysinfo command<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-49.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"840\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-49.png\" alt=\"\" class=\"wp-image-599\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-49.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-49-300x253.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-49-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-49-356x300.png 356w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Task B.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <br>Exploit EternalBlue on Windows Server 2008 with Metasploit<\/h1>\n\n\n\n<p>In this task, you need to use similar steps to exploit the <strong>EternalBlue <\/strong>vulnerability on Windows Server 2008. Make sure to search and replace the exploit module against Windows Server 2008 accordingly.<\/p>\n\n\n\n<ul>\n<li>Ran nmap scan for open ports and services using command namp 192.168.10.0\/24 -p- -sV<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-50.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-50.png\" alt=\"\" class=\"wp-image-600\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-50.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-50-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-50-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-50-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Started Metasploit and searched from eternalblue<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-51.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-51.png\" alt=\"\" class=\"wp-image-601\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-51.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-51-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-51-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-51-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Used exploit option 2<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-52.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-52.png\" alt=\"\" class=\"wp-image-602\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-52.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-52-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-52-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-52-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ol>\n<li>Configure your Metasploit accordingly and set DDMMYY as the listening port number. Display the configuration and exploit the target.\n<ol>\n<li>set payload and other configurations\n<ol>\n<li>attempted to use date but unfortunately it was out of range and used 4498 for lport instead<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-53.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-53.png\" alt=\"\" class=\"wp-image-603\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-53.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-53-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-53-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-53-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>exploited machine successfully<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-54.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-54.png\" alt=\"\" class=\"wp-image-604\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-54.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-54-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-54-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-54-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>[Post-exploitation] Execute the screenshot command to take a screenshot of the target machine if the exploit is successful.<ul><li>used command screenshot -p \/root\/windows08.jpg<ul><li>screenshot is on next page with the rest of the post-exploitation tasks<\/li><\/ul><\/li><\/ul>\n<ul>\n<li>image<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-55.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-55.png\" alt=\"\" class=\"wp-image-605\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-55.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-55-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-55-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-55-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>[Post-exploitation] In meterpreter shell, display the target system\u2019s local date and time.\n<ul>\n<li>Used command localtime<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>[Post-exploitation] In meterpreter shell, get the SID of the user.\n<ul>\n<li>Used command getsid<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>[Post-exploitation] In meterpreter shell, get the current process identifier.\n<ul>\n<li>Used command getpid<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>[Post-exploitation] In meterpreter shell, get system information about the target.\n<ul>\n<li>Used command getsysinfo<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-56.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"838\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-56.png\" alt=\"\" class=\"wp-image-606\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-56.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-56-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-56-768x645.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-56-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Task C.\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0<br>Exploit Windows 7 with a deliverable payload.<\/h1>\n\n\n\n<p>In this task, you need to create an executable payload with the required configurations below. Once your payload is ready, you should upload it to the web server running on Kali Linux and download the payload from Windows 7, then execute it on the target to make a reverse shell. Of course, don&#8217;t forget to configure your Metasploit on Kali Linux before the payload is triggered on the target VM.<\/p>\n\n\n\n<p>The requirements for your payload are:<\/p>\n\n\n\n<ul>\n<li>Payload Name: Use your MIDAS ID\n<ul>\n<li>Used msfvenom to create deliverable payload<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-57.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"840\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-57.png\" alt=\"\" class=\"wp-image-607\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-57.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-57-300x253.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-57-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-57-356x300.png 356w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Listening port: <strong><em><u>4498<\/u><\/em><\/strong><ul><li>set lport and lhost in meterpreter<\/li><\/ul>\n<ul>\n<li>started exploit (waiting for connection)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-58.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"840\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-58.png\" alt=\"\" class=\"wp-image-608\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-58.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-58-300x253.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-58-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-58-356x300.png 356w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Started apache 2<strong><u><\/u><\/strong><\/li>\n\n\n\n<li>Copied ewell007.exe payload to apache2<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-59.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"840\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-59.png\" alt=\"\" class=\"wp-image-609\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-59.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-59-300x253.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-59-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-59-356x300.png 356w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Ran ewell007.exe on windows 7<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-60.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"862\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-60.png\" alt=\"\" class=\"wp-image-610\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-60.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-60-300x259.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-60-768x663.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-60-347x300.png 347w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Session was successfully opened on internal kali meterpreter<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-61.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"840\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-61.png\" alt=\"\" class=\"wp-image-611\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-61.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-61-300x253.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-61-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-61-356x300.png 356w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<p><strong><br><\/strong><\/p>\n\n\n\n<p><strong>[Post-exploitation] <\/strong>Once you have established the reverse shell connection to the target Windows 7, complete the following tasks in your meterpreter shell:<\/p>\n\n\n\n<ol>\n<li>Execute the screenshot command to take a screenshot of the target machine if the exploit is successful.\n<ol>\n<li>Used command screenshot -p \/root\/windows07.jpeg<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-62.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-62.png\" alt=\"\" class=\"wp-image-612\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-62.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-62-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-62-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-62-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>image<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-63.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"840\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-63.png\" alt=\"\" class=\"wp-image-613\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-63.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-63-300x253.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-63-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-63-356x300.png 356w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Create a text file on the attacker Kali named &#8220;IMadeIT-YourMIDAS.txt&#8221; (replace YourMIDAS with your university MIDAS ID) and put the current timestamp in the file. Upload this file to the target&#8217;s desktop. Then log in to Windows 7 VM and check if the file exists. You need to show me the command that uploads the file.\n<ul>\n<li>Created file on internal kali<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-64.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"841\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-64.png\" alt=\"\" class=\"wp-image-614\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-64.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-64-300x253.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-64-768x647.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-64-356x300.png 356w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Used command upload [filename] to window 7 desktop<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-65.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-65.png\" alt=\"\" class=\"wp-image-615\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-65.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-65-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-65-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-65-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Verified<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-66.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"885\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-66.png\" alt=\"\" class=\"wp-image-616\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-66.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-66-300x266.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-66-768x681.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-66-338x300.png 338w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<p><strong><br><\/strong><\/p>\n\n\n\n<p><strong>[Privilege escalation, extra credit] <\/strong>Background your current session, then gain administrator-level privileges on the remote system. After you escalate the privilege, complete the following tasks:<\/p>\n\n\n\n<ul>\n<li>Create a malicious account with your name and add this account to the administrator group. You need to complete this step on the Attacker Side.<ul><li>Used a UAC bypass to increase the privileges of our connection to create user EdwinW with password iamhere<\/li><\/ul>\n<ul>\n<li>Then elevated the shadow account to the administrator group for future access<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-67.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"838\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-67.png\" alt=\"\" class=\"wp-image-617\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-67.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-67-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-67-768x645.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-67-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Remote access to the malicious account created in the previous step and browse the files belonging to the user, &#8220;Windows 7&#8221;, in RDP.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-68.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"838\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-68.png\" alt=\"\" class=\"wp-image-618\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-68.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-68-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-68-768x645.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-68-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Task D.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Extra Credit<\/h1>\n\n\n\n<ul>\n<li>Find another exploit that targets on either Windows XP or Windows Server 2008.<\/li>\n<\/ul>\n\n\n\n<ul>\n<li>Used nmap 192.168.10.0\/24 -p- -sV to scan open ports and services<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-69.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-69.png\" alt=\"\" class=\"wp-image-619\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-69.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-69-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-69-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-69-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Ran nessuss to scan for vulnerabilities of 192.168.10.11<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-70.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"840\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-70.png\" alt=\"\" class=\"wp-image-620\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-70.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-70-300x253.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-70-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-70-356x300.png 356w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Started, searched and gained information on ms12-020<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-71.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"839\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-71.png\" alt=\"\" class=\"wp-image-621\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-71.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-71-300x252.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-71-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-71-357x300.png 357w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Configured settings and exploited 192.168.10.11<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-72.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"840\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-72.png\" alt=\"\" class=\"wp-image-622\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-72.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-72-300x253.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-72-768x646.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-72-356x300.png 356w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n\n\n\n<ul>\n<li>Windows 2008 side blue screen of death<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-73.png\"><img loading=\"lazy\" decoding=\"async\" width=\"998\" height=\"939\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-73.png\" alt=\"\" class=\"wp-image-623\" srcset=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-73.png 998w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-73-300x282.png 300w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-73-768x723.png 768w, https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-content\/uploads\/sites\/30994\/2024\/11\/image-73-319x300.png 319w\" sizes=\"(max-width: 998px) 100vw, 998px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Old Dominion University CYSE 301 Cybersecurity Techniques and Operations Assignment 4: Ethical Hacking (v3) Edwin C Wells IV Task A.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exploit SMB on Windows XP with Metasploit In this task, you need to complete the following steps to exploit SMB vulnerability on Windows XP. Task B.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exploit EternalBlue on Windows Server 2008 with Metasploit&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/ethical-hacking\/\">Read More<\/a><\/div>\n","protected":false},"author":25223,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/590"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/users\/25223"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/comments?post=590"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/590\/revisions"}],"predecessor-version":[{"id":624,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/590\/revisions\/624"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/media?parent=590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}