We will discuss the meterpreter approach down the road. We choose this in order to get a shell upon execution and not a meterpreter. We will be using the windows/圆4/shell_reverse_tcp exploit. Firstly, we craft a payload using MSFvenom. Since we are talking about the post-exploitation or the scripts that can be used to enumerate the conditions or opening to elevate privileges, we first need to exploit the machine. Or if you have got the session through any other exploit then also you can skip this section. If you are more of an intermediate or expert then you can skip this and get onto the scripts directly. This step is for maintaining continuity and for beginners. Several scripts are used in penetration testing to quickly identify potential privilege escalation vectors on Windows systems, and today we will elaborate on each script that works smoothly.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |