Advanced extended features of Metasploit

Throughout this chapter, we've covered a lot of post exploitation. Let's now cover some of the advanced exploitation features of Metasploit in this section.

Privilege escalation using Metasploit

During the course of a penetration test, we often run into situations where we have limited access and if we run commands such as hashdump, we might get the following error:

Privilege escalation using Metasploit

In such cases, if we try to get system privileges with the getsystem command, we get the following errors:

Privilege escalation using Metasploit

So, what shall we do in these cases? ...

Get Mastering Metasploit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.