Exploit Common Windows Flaws
In this lab scenario, you are a network and security administrator who will learn about common Windows® flaws that attackers may exploit. You will remotely attack Windows Server® Message Block (SMB) vulnerabilities to extract information from other Windows systems on the network; attack a Windows network from within to access other users’ password ...
Already have an account? Sign In »

Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.
Understand the Scenario
You are a network and security administrator. As part of your penetration testing program, you need to learn about common Windows® flaws that attackers may exploit. First, you will remotely attack Windows Server® Message Block (SMB) vulnerabilities to extract information from other Windows systems on the network. Next, you will attack a Windows network from within to access other users’ password hashes. Finally, you will execute commands remotely between Windows systems.
Understand Your Environment
You will be using a Windows Server 2019 virtual machine named WS2019-WS1-SRV, and a Windows Server 2012 virtual machine named Win2012R2, and a Kali Linux™ virtual machine named Kali Linux 2021.