Perform Post-Exploit Activities

Skillable
Learn On Demand Pro Series
New

Learn about the types of post-exploit activities that adversaries may engage in once they have breached the security of a target. You will use Metasploit to gain remote access to a Windows limited user account, perform post-exploit privilege escalation and other activities by using SYSTEM-level privileges, and hide files by using New Technology Fil...

Time
30 minutes
Difficulty
Beginner
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.

Understand the Scenario

You are a network and security administrator. As part of your penetration testing program, you need to learn about the types of post-exploit activities that adversaries may engage in once they have breached the security of a target. First, you will use Metasploit to gain remote access to Windows® under a limited user account, and then you will perform post-exploit privilege escalation. Next, you will perform post-exploit activities by using SYSTEM-level privileges. Finally, you will hide files by using New Technology File System (NTFS) alternate data streams (ADS).

Understand Your Environment

You will be using a Kali Linux™ virtual machine named Kali Linux 2021, a Windows 7 virtual machine named Win 7 CLI, and a Windows 10 virtual machine named WIN 10-CL-1.