Metasploit: Meterpreter

February 08, 2024

The room is instructed us to use the exploit/windows/smb/psexec in the msfconsole

Then we will prompted to change the options according to our need for us to exploit the machine

use exploit/windows/smb/psexec

After running the exploit there is now a meterpreter session open

Using the "sysinfo" command will display the computer name, domain, os, and etc.

Then we will use "shell" command to give us a regular command-line shell like powershell

After that use the net share to display the shares within the domain

meterpreter > shell

net share

List the processes by using "ps" command, so that later on we can use the processes that are listed on

Then the "getpid" command will give us the current process that we are in

Migrating to process lsass.exe will give us access to hashdump

Now we got the hash value of the user jchambers2 we will use hashcat to crack the password

hashcat -m 1000 hash.txt /usr/share/wordlists/rockyou.txt

Last updated