Post Exploitation
Core Features
Take a screenshot of the compromised desktop:
Start a keylogger:
Migrating Processes
When we compromise a host, our Meterpreter payload is executed inside the process of the application we attack. If the victim closes that process, our access to the machine is closed as well.
Using migrate
command, we can move the execution of our Meterpreter to different processes. To do this, we first run ps
to view all running processes and then pick one, like explorer.exe
, and issue the migrate
command:
Or, we can set an autorun script before running the module:
Modules
Bypass UAC:
PowerShell:
Mimikatz:
Pivoting
Enumerate network interfaces:
Found two nework interfaces:
We are on 192.168.214.10 and we want to pivot to 172.16.214.10. Use autoroute:
Use auxiliary/server/socks_proxy
to configure a SOCKS proxy:
Configure proxychains at /etc/proxychains4.conf
:
Now we can run commands with proxychains
as prefix to pivot. For example:
Last updated