Lab
In this lab, we are going to take a brief look at what can be considered malware without actually infecting a system or posing potential harm to your machines.
Within Metasploit, there are tools and exploits built into it that we can take a moment to analyze. The following instructions will allow you to analyze the Mimikatz password extractor:
- Launch the Kali VM and log in.
- Open a Terminal session on the machine.
- The first tool we are going to use is file, to identify what kind of file it is we are working with. To do this, type and run the following command:
file /usr/share/windows-resources/mimikatz/x64/mimikatz.exe
This will return it as a PE executable.
- Next, we are going to hash the file so that we can check online resources about its reputation. To do this, type and run the following command:
md5sum /usr/share/windows-resources/mimikatz/x64/mimikatz.exe
This will return the hash value of the file.
- Next, we are going to check the online reputation of...