Introduction
4 post-exploit steps
Privilege Escalation and Maintaining access
Data Harvesting
Internal Network Scan
Exploitation of new systems and pivoting
Also in Metasploit, there is a compiled UAC bypass payload in
/usr/share/metasploit-framework/data/post/bypassuac-x64.exe
To use, drop this executable in the target system. In the cmd:
Then you will have a cmd shell as the user, but with the privilege of admin.
SessionGopher
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
Impersonate SSL
In msfconsole, there is an aux module to do this:
Then generate the payload:
Then create a multi handler with the same config:
Last updated