Postexploitation
◾
269
For
the sake of the demonstration, we will test on the same target that we exploited. In the real
world, you would test other targets.
From the picture, we can see that the user “
rafay
” has been authenticated.
psexec
Now that we know that the user “
rafay
” is able to authenticate
on the target machine, we will
use the psexec module to exploit the target system. On the Search bar type “psexec” and double
click it to enter the configuration menu. You would need to define the “rhost,”
the smb username,
and the LM/NTLM password hash.
The user would be authenticated and you would have a meterpreter session opened.