Task 1.4: Download the attack tools
In this step, you’ll download several third-party tools needed to complete the attacks in the lab exercises. These steps are all performed on the domain controller using the DC01 RDP session.
-
In a new browser tab, go to https://www.joeware.net/freetools/tools/netsess/
- Scroll to the bottom and select Download Now.
-
In the same browser tab, go to https://github.com/gentilkiwi/mimikatz/releases
- Select mimikatz_trunk.zip.
- In the Download pop-up window, select the Warning.
- Select the ellipses (…) to the right, and then select Keep.
- In the This app is unsafe pop-up window, select Show more, and then select Keep anyway.
-
In the same browser tab, go to https://github.com/ANSSI-FR/ORADAD/releases
- Select ORADAD.zip
-
In the same browser tab, go to https://github.com/r3motecontrol/Ghostpack-CompiledBinaries
- On the This site has been reported as unsafe page, select more information, and then select Continue to the unsafe site (not recommended).
- Select Rubeus.exe, and then select Download raw file
.
- In the Download pop-up window, select the warning.
- Select the ellipses (…) to the right, and then select Keep.
- In the Keep unsafe file pop-up window, select Keep anyway.
- If prompted again, select Keep anyway.
- In the same browser tab, go to https://learn.microsoft.com/en-us/sysinternals/downloads/psexec
- Select Download PSTools.
-
On the Windows taskbar, open File Explorer, and then select the Downloads folder.
- Copy PStools, Rubeus, ORADAD, mimikatz_trunk, and NetSess to the C:\Tools folder.
- Extract each of the zipped files in the C:\Tools folder.