From the course: Metasploit Essential Training

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Understand how to use the incognito extension

Understand how to use the incognito extension

From the course: Metasploit Essential Training

Understand how to use the incognito extension

- [Instructor] We've spoken a lot about using Meterpreter and also MSFVenom. Now of course, there are other tools available to us that can be utilized within things like Meterpreter, and one of them is called Incognito. Now, Incognito used to be a standalone application, but it's now bundled in as part of Metasploit itself. So let's see what this does and how we can utilize it. But in a nutshell, it allows us to impersonate tokens from the target machine that we've connected to. So the first thing we'll do here is we'll actually go exploit the Windows machine again. So SMB, PS exec. We'll set the R host to be the same as it was before. So ten dot 100 dot ten dot 105. We're going to set the SMB user account to be my trainer account and we'll set the SMB Pass to be the password for that account. We'll also then set the payload which we don't necessarily have to set here because we already have the default payload set. But…

Contents