LightBlog
Contact at mumbai.academics@gmail.com or 8097636691/9323040215
Responsive Ads Here

Sunday, 5 August 2018

Metasploit - Credential

Metasploit - Credential


After gaining access to a machine, it is important to take all the sensitive information such as usernames and passwords. You can perform this operation for auditing purpose as well, to analyze if the systems in your organization are using strong passwords or not.
In Windows, the passwords are stored in an encrypted form which are called NTLM hash. In Windows OS, you should always look for the user having the number 500, which signifies that the user is a superuser.
Superuser
In the free version of Metasploit, hash credentials have to be saved in a text file or in the Metasploit database.

Example

Let’s use the scenario that we have used in the previous chapter. Assume we have a Windows Server 2003 machine which is vulnerable to DCOM MS03-026. We gained access to this system and inserted the meterpreter payload.
The command generally used in meterpreter is hashdump which will list all the usernames and the passwords.
Hashdump
You can also use Armitage to retrieve this information, as shown in the following screenshot.
Use Armitage
The commercial edition Metasploit has a separate session called Credentialwhich allows to collect, store, and reuse the credentials. Let’s see how to go about it.
To collect sensitive data, first go to: Home → Project Name → Sessions.
Credential
Click on the active session.
Click Active Session
Next, click Collect System Data. It will collect all the HASH and passwords.
Collect System Data
You will get to see a screen as follows −
Screen
To see the collected credentials, go to Home → Project Name → Credentials → Manage.
Manage
As shown in the following screenshot, you will see all the passwords gained and those that could be cracked.
Passwords

No comments:

Post a Comment