Exploit Common Windows Flaws

In this lab scenario, you are a network and security administrator who will learn about common Windows® flaws that attackers may exploit. You will remotely attack Windows Server® Message Block (SMB) vulnerabilities to extract information from other Windows systems on the network; attack a Windows network from within to access other users’ password ...

Time
30 minutes
Difficulty
Beginner
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Understand the Scenario

You are a network and security administrator. As part of your penetration testing program, you need to learn about common Windows® flaws that attackers may exploit. First, you will remotely attack Windows Server® Message Block (SMB) vulnerabilities to extract information from other Windows systems on the network. Next, you will attack a Windows network from within to access other users’ password hashes. Finally, you will execute commands remotely between Windows systems.

Understand Your Environment

You will be using a Windows Server 2019 virtual machine named WS2019-WS1-SRV, and a Windows Server 2012 virtual machine named Win2012R2, and a Kali Linux™ virtual machine named Kali Linux 2021.