Target IP: 192.168.142.100 -------------------------------------- Maximum Potential Points: 40 You have agreed with the client to perform an external black box penetration test against their Microsoft Windows Active Directory infrastructure. The final objective of the Active Directory penetration test is to gain Domain Administrator level rights on the network. The Active Directory network can be located at the following IP addresses: 192.168.142.100 192.168.142.101 192.168.142.102 Main Objectives: - Get Administrative interactive access to the MS02 client machine and obtain local.txt and proof.txt files in a valid way. - Get Administrative interactive access to the MS01 client machine and obtain local.txt and proof.txt files in a valid way. - Get Administrative interactive access to the Domain Controller and obtain the proof.txt file in a valid way, note that there is no local.txt file. - Submit local.txt and proof.txt files in the Control Panel. Documentation Requirements: - Document each step and command of your attack in a way that it can be replicated following a "copy/paste" approach - Create screenshots showing various steps and stages of the attack performed - Create a valid screenshot showing the content of proof.txt and the machine IP address - Provide the link or the copy of the script/exploits being used - Document any changes done to the original scripts or exploits being used - Provide a summary and overview of the vulnerabilities found in performed attacks and exploitation process. You must show all steps executed against the entire Active Directory domain used to obtain Domain Administrator privileges. To ensure the stability of the Active Directory network, it is not possible to revert a single specific VM. Instead, reverting any of the target machines in the AD network will revert all the machines at once. IMPORTANT NOTE: Please ensure to wait for 5 minutes after reverting the machines to ensure all necessary services are working properly. Note that reverting all machines can take an estimated five to seven (5-7) minutes. Please note that not all machines will respond to ICMP/ping requests. Should you believe a machine is not working properly after a revert, please make sure to follow the Exam Contact Protocol outlined in the OSCP Exam Guide. There are no dependencies between the Active Directory infrastructure and the freestanding hosts. Target IP: 192.168.142.110 -------------------------------------- Maximum Potential Points: 20 Main Objectives: - Get interactive access to the machine and obtain local.txt file in valid way - Submit local.txt in the Control Panel - Get interactive access to the machine and obtain proof.txt file in valid way - Submit proof.txt in the Control Panel Documentation Requirements: - Document each step and command of your attack in a way that it can be replicated following a "copy/paste" approach - Create screenshots showing various steps and stages of the attack performed - Create a valid screenshot showing the content of local.txt and machine IP address - Create a valid screenshot showing the content of proof.txt and machine IP address - Provide the link or the copy of the script/exploits being used - Document any changes done to the original scripts or exploits being used - Provide a summary and overview of the vulnerabilities found, performed attacks and exploitation process Target IP: 192.168.142.111 -------------------------------------- Maximum Potential Points: 20 Main Objectives: - Get interactive access to the machine and obtain local.txt file in valid way - Submit local.txt in the Control Panel - Get interactive access to the machine and obtain proof.txt file in valid way - Submit proof.txt in the Control Panel Documentation Requirements: - Document each step and command of your attack in a way that it can be replicated following a "copy/paste" approach - Create screenshots showing various steps and stages of the attack performed - Create a valid screenshot showing the content of local.txt and machine IP address - Create a valid screenshot showing the content of proof.txt and machine IP address - Provide the link or the copy of the script/exploits being used - Document any changes done to the original scripts or exploits being used - Provide a summary and overview of the vulnerabilities found, performed attacks and exploitation process Target IP: 192.168.142.112 -------------------------------------- Maximum Potential Points: 20 Main Objectives: - Get interactive access to the machine and obtain local.txt file in valid way - Submit local.txt in the Control Panel - Get interactive access to the machine and obtain proof.txt file in valid way - Submit proof.txt in the Control Panel Documentation Requirements: - Document each step and command of your attack in a way that it can be replicated following a "copy/paste" approach - Create screenshots showing various steps and stages of the attack performed - Create a valid screenshot showing the content of local.txt and machine IP address - Create a valid screenshot showing the content of proof.txt and machine IP address - Provide the link or the copy of the script/exploits being used - Document any changes done to the original scripts or exploits being used - Provide a summary and overview of the vulnerabilities found, performed attacks and exploitation process 目標IP:192.168.142.100 -------------------------------------- 最大潛力點:40 您已同意客戶針對其 Microsoft Windows Active Directory 基礎架構執行外部黑盒滲透測試。 Active Directory 滲透測試的最終目標是取得網路上的網域管理員等級權限。 Active Directory 網路可以位於下列 IP 位址: 192.168.142.100 192.168.142.101 192.168.142.102 主要目標: - 取得MS02客戶端電腦的管理互動存取並以有效的方式取得local.txt和proof.txt檔案。 - 取得MS01用戶端電腦的管理互動存取並以有效的方式取得local.txt和proof.txt檔案。 - 取得對網域控制器的管理互動式存取並以有效方式取得proof.txt 文件,請注意,沒有local.txt 檔案。 - 在控制面板中提交local.txt和proof.txt檔案。 文件要求: - 以可透過「複製/貼上」方法複製的方式記錄攻擊的每個步驟和命令 - 建立螢幕截圖,顯示所執行攻擊的各個步驟和階段 - 建立有效的螢幕截圖,顯示proof.txt的內容和機器IP位址 - 提供正在使用的腳本/漏洞的連結或副本 - 記錄對原始腳本或正在使用的漏洞所做的任何更改 - 提供在執行的攻擊和利用過程中發現的漏洞的摘要和概述。您必須顯示針對整個 Active Directory 網域執行的用於取得網域管理員權限的所有步驟。 為了確保 Active Directory 網路的穩定性,無法復原單一特定 VM。相反,恢復 AD 網路中的任何目標電腦將立即恢復所有電腦。 重要提示:恢復電腦後請務必等待 5 分鐘,以確保所有必要的服務正常運作。 請注意,恢復所有電腦可能需要大約五到七 (5-7) 分鐘。 請注意,並非所有計算機都會回應 ICMP/ping 請求。 如果您認為恢復後機器無法正常運作,請確保遵循 OSCP 考試指南中概述的考試聯繫協議。 Active Directory 基礎架構和獨立主機之間不存在相依性。 目標IP:192.168.142.110 -------------------------------------- 最大潛力點:20 主要目標: - 互動式存取機器並以有效方式取得local.txt文件 - 在控制面板中提交local.txt - 互動式存取機器並以有效方式取得proof.txt文件 - 在控制面板中提交proof.txt 文件要求: - 以可透過「複製/貼上」方法複製的方式記錄攻擊的每個步驟和命令 - 建立螢幕截圖,顯示所執行攻擊的各個步驟和階段 - 建立有效的螢幕截圖,顯示 local.txt 的內容和機器 IP 位址 - 建立有效的螢幕截圖,顯示proof.txt的內容和機器IP位址 - 提供正在使用的腳本/漏洞的連結或副本 - 記錄對原始腳本或正在使用的漏洞所做的任何更改 - 提供發現的漏洞、執行的攻擊和利用過程的摘要和概述 目標IP:192.168.142.111 -------------------------------------- 最大潛力點:20 主要目標: - 互動式存取機器並以有效方式取得local.txt文件 - 在控制面板中提交local.txt - 互動式存取機器並以有效方式取得proof.txt文件 - 在控制面板中提交proof.txt 文件要求: - 以可透過「複製/貼上」方法複製的方式記錄攻擊的每個步驟和命令 - 建立螢幕截圖,顯示所執行攻擊的各個步驟和階段 - 建立有效的螢幕截圖,顯示 local.txt 的內容和機器 IP 位址 - 建立有效的螢幕截圖,顯示proof.txt的內容和機器IP位址 - 提供正在使用的腳本/漏洞的連結或副本 - 記錄對原始腳本或正在使用的漏洞所做的任何更改 - 提供發現的漏洞、執行的攻擊和利用過程的摘要和概述 目標IP:192.168.142.112 -------------------------------------- 最大潛力點:20 主要目標: - 互動式存取機器並以有效方式取得local.txt文件 - 在控制面板中提交local.txt - 互動式存取機器並以有效方式取得proof.txt文件 - 在控制面板中提交proof.txt 文件要求: - 以可透過「複製/貼上」方法複製的方式記錄攻擊的每個步驟和命令 - 建立螢幕截圖,顯示所執行攻擊的各個步驟和階段 - 創建一個有效的scr