Let's perform some post-exploitation attacks in the lab environment. We will use the Metasploitable 3 virtual machine as an entry point, since we know there are vulnerabilities that exist.
Using the windows/smb/ms17_010_eternalblue exploit, we will spawn a Meterpreter session. Once we have the session established, we will escalate to system privileges using the getsystem command.
Once we have a Meterpreter session, we will confirm the current system's information using the sysinfo command:
![](https://static.packt-cdn.com/products/9781838640163/graphics/assets/66418363-a9f2-4af8-b302-10e65d153faa.png)
Figure 20: Confirming current system information
Here, we have some interesting information: we can see that there are three users who are logged in. Let's proceed and perform credential harvesting.