Title: Immersive Labs (Lightening write ups) Date: 06/10/2020 Category: labs
Okay, so last time I covered the overall impressions of immersive labs.
Once again, no spoilers:
Netcat: Do the things and copy-paste tokens. For extra interest, I found the script that generates tokens.
Server Identification: I’m not quite sure what you’re supposed to get from this one? Again, not without spoilers.
DLL Injection: as referenced last time, I had trouble with this as I didn’t realise restarting a machine didn’t kill the session. The principle is easy enough, and you have metasploit, but the correct path takes some digging. I also kept forgetting you can just spin up a http server from your attacker machine, for when you want to transfer files over.