Question: a ) Figure out how to dump the password hashes off of the vulnerable Server using a METERPRETR COMMAND. You should not use the post
a Figure out how to dump the password hashes off of the vulnerable Server using a METERPRETR COMMAND. You should not use the postwindowsgatherhashdump Metasploit module as it will give you results from the SAM file, where we are looking for the NTDSdit. Use a native Meterpreter command instead use.
b Figure out how to get System level access again by removing your token there is a Meterpreter command that you can run that will put your Meterpreter session back in the context of the System account from a standard user account. This command is NOT getsystem.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
