Metasploit: Meterpreter
February 08, 2024
Last updated
February 08, 2024
Last updated
The room is instructed us to use the exploit/windows/smb/psexec in the msfconsole
Then we will prompted to change the options according to our need for us to exploit the machine
After running the exploit there is now a meterpreter session open
Using the "sysinfo" command will display the computer name, domain, os, and etc.
Then we will use "shell" command to give us a regular command-line shell like powershell
After that use the net share to display the shares within the domain
List the processes by using "ps" command, so that later on we can use the processes that are listed on
Then the "getpid" command will give us the current process that we are in
Migrating to process lsass.exe will give us access to hashdump
Now we got the hash value of the user jchambers2 we will use hashcat to crack the password