Use the Multihandler Approach with a reverse TCP payload to gain access, followed by a migrating the process with a post exploitation technique to gain control over the current logged in user. <br />This only gives access based on the logged in user. <br />Watch further videos for gaining "SYSTEM" <br /> <br />This video is purely for educational purposes and I do not condone or recommned attempting any of the techniques in this video on any network or part of any network you do not have 100% consent to do so on. I hold no responsibility for any loss of service, corruption or loss of data due to following the steps in this video.