Lab 1
Required Software:
Mongoose (https://github.com/lawrenceamer/0xsp-Mongoose/) and a victim PC that is Windows or Linux.
Scenario:
In this lab we will use Mongoose to launch a privilege escalation attack on a Windows device (it can also be a Linux device; most of the commandlets are the same).
Let's start Hacking!
- Once you download the tool from GitHub, run Command Prompt (cmd) as administrator, and change the path of cmd to the Windows agent folder, which in my case is:
C:\ cd C:\Users\Erdal\Desktop\Mongoose\windows agent
Figure 37: Changing the path of commands to the Windows agent folder
- You can execute the 64 or 32 bit command based on your computer. In my case this is:
C:\Users\Erdal\Desktop\Mongoose\windows agent\64.exe
Figure 38: Executing the command
As you can see Mongoose rapidly discovers the details of your OS.
- You can use the
agent.exe-h
command to get help about the possible command options, as can be seen in the following screenshot...