19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 11-17:<br />

Checking<br />

final parameters<br />

before<br />

carrying out<br />

the exploit.<br />

Chapter 11: Windows<br />

7. Confirm your settings on the final screen, as shown in Figure 11-17,<br />

and click the Apply button.<br />

The job executes, and you see the shell session in the Sessions section<br />

in the lower-right quadrant of the Metasploit GUI.<br />

8. Double-click the session and a new window opens with a command<br />

prompt on the target system, as shown in Figure 11-18.<br />

I now “own” the system and can do whatever I want.<br />

For example, one thing I commonly do is add a user account to the exploited<br />

system. You can actually do this within Metasploit (via the adduser payloads),<br />

but I prefer to do it on my own so I can get screenshots of my actions.<br />

To add a user, simply enter net user username password /add at the<br />

Metasploit command prompt.<br />

Next, I add the user to the local administrators group by entering net localgroup<br />

administrators username /add at the Metasploit command prompt.<br />

You can then log in to the remote system by mapping a drive to the C$ share<br />

or by connecting via Remote Desktop.<br />

221

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!