Skip to main content

THM | Metasploit: Meterpreter

· 2 min read

Windows Exploitation Basics | Metasploit: Meterpreter | Summary:

This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Metasploit: Meterpreter room.


Disclaimer: Please note that this write-up is NOT intended to replace the original room or its content, but rather serve as supplementary material for those who are stuck and need additional guidance.

Task | 1 | Introduction to Meterpreter

Question 1: No answer needed

No answer needed

Task | 2 | Meterpreter Flavors

Question 1: No answer needed

No answer needed

Task | 3 | Meterpreter Commands

Question 1: No answer needed

No answer needed

Task | 4 | Post-Exploitation with Meterpreter

Question 1: No answer needed

No answer needed

Task | 5 | Post-Exploitation Challenge

Question 1: What is the computer name?

ACME-TEST

Question 2: What is the target domain?

FLASH

Question 3: What is the name of the share likely created by the user?

speedster

Question 4: What is the NTLM hash of the jchambers user?

69596c7aa1e8daee17f8e78870e25a5c

Question 5: What is the cleartext password of the jchambers user?

Trustno1

Question 6: Where is the "secrets.txt" file located? (Full path of the file)

c:\Program Files (x86)\Windows Multimedia Platform\secrets.txt

Question 7: What is the Twitter password revealed in the "secrets.txt" file?

KDSvbsw3849!

Question 8: Where is the "realsecret.txt" file located? (Full path of the file)

c:\inetpub\wwwroot\realsecret.txt

Question 9: What is the real secret?

The Flash is the fastest man alive