Back to Browse

Mouse Trap | TryHackMe | Mobile Mouse Server | CVE-2023-31902

1.6K views
Nov 17, 2024
58:39

πŸ‘¨πŸ»β€πŸ’»πŸ‘ΎπŸ­ Follow the adventures of Jom and Terry, members of the TryMouseMe purple team, as they work through a thrilling exercise of Attack and Defense. From initial access to persistence, you will emulate a three-stage attack on a Windows environment. πŸ‘¨πŸ»β€πŸ’»πŸ‘ΎπŸ­ Attack Emulation VM (TA001: Initial access, TA004: Privilege Escalation, TA003: Persistence) CVE-2023-31902, SharpUp.exe πŸ‘¨πŸ»β€πŸ’»πŸ‘ΎπŸ­ Mobile Mouse 3.6.0.4 Remote Code Execution Exploit πŸ‘¨πŸ»β€πŸ’»πŸ‘ΎπŸ­ https://github.com/blue0x1/mobilemouse-exploit/tree/main 🐭 After finding a vulnerable service, you will get a user shell via remote code execution. 🐭 You will then escalate your privileges through an unquoted service path. 🐭 Finally, you will maintain persistence thanks to registry run keys and local user account creation. πŸ‘¨πŸ»β€πŸ’» πŸ‘ΎπŸ­ Now that you’ve successfully emulated the attack, it’s time to put on your blue cap and investigate the logs generated by the same attack chain. Timeline Explorer, EvtxECmd 🐭🐭🐭 Room Link: https://tryhackme.com/r/room/mousetrap 🐭🐭🐭 πŸ‘ Like, Subscribe, and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need further clarification on any concept, feel free to drop a comment below! these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #tryhackme #tryhackmechallenges #MouseTrap #CVE202331902 #CTF #MobileMouseServer

Download

0 formats

No download links available.

Mouse Trap | TryHackMe | Mobile Mouse Server | CVE-2023-31902 | NatokHD