Now comes the second phase of our exercise. Once we have the meterpreter shell, we will attempt to perform privilege escalation and get the highest possible privilege on this target server.
But first, let's learn more about our target server. Run the following command:
sysinfo
The output of the preceding command is as follows:
We are presented with a bunch of information, such as which version of Windows this machine is running, the domain, and so on.
As it is time to perform privilege escalation, issue the following command:
getsystem
If successful, you should typically get a response such as:
...got system via technique 1 (Named Pipe Impersonation (In Memory/Admin))
This means our privilege escalation was successful. To verify that, we can issue the following command:
getuid
If we are the highest privileged...