Perform Post-Exploit Activities
Learn about the types of post-exploit activities that adversaries may engage in once they have breached the security of a target. You will use Metasploit to gain remote access to a Windows limited user account, perform post-exploit privilege escalation and other activities by using SYSTEM-level privileges, and hide files by using New Technology Fil...
Note: Once you begin a challenge you will not be able to pause, save, or return to your progress. Please ensure you have set aside enough time to complete the challenge before you start.
Understand the Scenario
You are a network and security administrator. As part of your penetration testing program, you need to learn about the types of post-exploit activities that adversaries may engage in once they have breached the security of a target. First, you will use Metasploit to gain remote access to Windows® under a limited user account, and then you will perform post-exploit privilege escalation. Next, you will perform post-exploit activities by using SYSTEM-level privileges. Finally, you will hide files by using New Technology File System (NTFS) alternate data streams (ADS).
Understand Your Environment
You will be using a Kali Linux™ virtual machine named Kali Linux 2021, a Windows 7 virtual machine named Win 7 CLI, and a Windows 10 virtual machine named WIN 10-CL-1.