O'Reilly logo

Building Virtual Pentesting Labs for Advanced Penetration Testing by Kevin Cardwell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Pilfering data from the client

Once we have the shell of the machine, we will pilfer information from it. First, we will check what privilege level we are at. We want to be at the system privilege level so that we can access the data without problem. We need to interact with our shell, so press Enter in the Kali window and enter sessions –i 1 to access the session. Once you are in the session, enter getuid. An example of this is shown in the following screenshot:

Pilfering data from the client

As the previous screenshot shows, we are not at the system privilege level, so we want to fix that now. Enter ps to display the running processes on the victim machine. We will find a process ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required