Kernel exploitation with Metasploit
We can begin the kernel exploitation process by taking a look at how to use kernel exploits with the Metasploit framework. The Metasploit framework will offer an automated and modularized solution and will streamline the exploitation process.
For this section, our target system will be the Windows SP1 virtual machine. As a prerequisite, ensure that you have gained your initial foothold on the system and have a Meterpreter session:
- The first step involves scanning the target for potential exploits. We will be using the
local_exploit_suggester
module. This process was covered in depth in the previous chapter. - We can load the module in Metasploit by running the following command:
use post/multi/recon/local_exploit_suggester
- After loading the module, you will need to set the
SESSION
option for the module. TheSESSION
option requires the session ID of your Meterpreter session. This can be done by running the following command:set SESSION...