In this section, we will look at using Metasploit to obtain the highest level of privileges on the target system. Most of the applications we are targeting run on user-level privileges, which provide us with general access but not access to the complete system. However, to obtain system-level access, we need to escalate privileges using vulnerabilities in the target system after gaining access to the system. Let us see how we can achieve system-level access to various types of operating system in the next sections.
Metasploit and privilege escalation
Escalating privileges on Windows Server 2008
During a penetration test, we often run into situations where we have limited access, and, when running commands such as hashdump...