Metasploit was developed to support both exploit and post-exploit activities. The present version contains approximately 200 modules that simplify post-exploit activities. We will review some of the most important modules.
In the following screenshots, we have successfully exploited a Windows XP system (a "classic" attack that is frequently used to validate more complex aspects of
meterpreter). The initial step is to conduct an immediate reconnaissance of the network and the compromised system.
meterpreter shell is fragile and vulnerable to failure over an extended period of time. Therefore, once a system is exploited, we will migrate the shell and bind it with a more stable process. This ...