Maintaining access to AD

We have seen that we have many ways to achieve persistence on the target system, and we will see some more in the upcoming chapters; however, in a large network with many users, it might be easy to secretly add a domain user onto the controller to cement our access to the AD network. Let's load the post/windows/manage/add_user_domain module as follows:

We can see that we have already set all the required options such as USERNAME, PASSWORD, and SESSION. Let's run this module and see if our user was added to the domain or not:

We can see that we have successfully added our user hacker to the domain PYSSG. We can easily ...

Get Mastering Metasploit - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.