Mouse Trap | TryHackMe | Mobile Mouse Server | CVE-2023-31902
π¨π»βπ»πΎπ Follow the adventures of Jom and Terry, members of the TryMouseMe purple team, as they work through a thrilling exercise of Attack and Defense. From initial access to persistence, you will emulate a three-stage attack on a Windows environment. π¨π»βπ»πΎπ Attack Emulation VM (TA001: Initial access, TA004: Privilege Escalation, TA003: Persistence) CVE-2023-31902, SharpUp.exe π¨π»βπ»πΎπ Mobile Mouse 3.6.0.4 Remote Code Execution Exploit π¨π»βπ»πΎπ https://github.com/blue0x1/mobilemouse-exploit/tree/main π After finding a vulnerable service, you will get a user shell via remote code execution. π You will then escalate your privileges through an unquoted service path. π Finally, you will maintain persistence thanks to registry run keys and local user account creation. π¨π»βπ» πΎπ Now that youβve successfully emulated the attack, itβs time to put on your blue cap and investigate the logs generated by the same attack chain. Timeline Explorer, EvtxECmd πππ Room Link: https://tryhackme.com/r/room/mousetrap πππ π Like, Subscribe, and Comment to stay updated with our latest cybersecurity tutorials. If you have any questions or need further clarification on any concept, feel free to drop a comment below! these tutorials are for educational purposes and to encourage responsible and legal use of hacking knowledge. #tryhackme #tryhackmechallenges #MouseTrap #CVE202331902 #CTF #MobileMouseServer
Download
0 formatsNo download links available.