Chapter 8. Metasploit Extended

"Don't be afraid to steal, just steal the right stuff" - Mike Monteiro

This chapter will feature extended features and hardcore post exploitation. Throughout this chapter, we will focus on out-of-the-box approaches for post exploitation and will cover tedious tasks such as privilege escalation, getting passwords in clear text, finding juicy information, and much more.

During the course of this chapter, we will cover and understand the following key aspects:

  • Performing basic post exploitation
  • Using advanced post exploitation modules
  • Carrying out operations covertly
  • Privilege escalation
  • Finding passwords from the memory

Let's now jump into the post exploitation features of Metasploit and start with the basics in the next ...

Get Mastering Metasploit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.