THM | Metasploit: Meterpreter
Windows Exploitation Basics | Metasploit: Meterpreter | Summary:
This series of walkthroughs aims to help out complete beginners with finishing the Complete Beginner path on the TryHackMe website. It is based on the learning content provided in the Metasploit: Meterpreter room.
Disclaimer: Please note that this write-up is NOT intended to replace the original room or its content, but rather serve as supplementary material for those who are stuck and need additional guidance.
Task | 1 | Introduction to Meterpreter
Question 1: No answer needed
No answer needed
Task | 2 | Meterpreter Flavors
Question 1: No answer needed
No answer needed
Task | 3 | Meterpreter Commands
Question 1: No answer needed
No answer needed
Task | 4 | Post-Exploitation with Meterpreter
Question 1: No answer needed
No answer needed
Task | 5 | Post-Exploitation Challenge
Question 1: What is the computer name?
ACME-TEST
Question 2: What is the target domain?
FLASH
Question 3: What is the name of the share likely created by the user?
speedster
Question 4: What is the NTLM hash of the jchambers user?
69596c7aa1e8daee17f8e78870e25a5c
Question 5: What is the cleartext password of the jchambers user?
Trustno1
Question 6: Where is the "secrets.txt" file located? (Full path of the file)
c:\Program Files (x86)\Windows Multimedia Platform\secrets.txt
Question 7: What is the Twitter password revealed in the "secrets.txt" file?
KDSvbsw3849!
Question 8: Where is the "realsecret.txt" file located? (Full path of the file)
c:\inetpub\wwwroot\realsecret.txt
Question 9: What is the real secret?
The Flash is the fastest man alive