- To start using post-exploitation modules, first we need to get a session on the target system. For that, you can use a resource file or manually exploit a vulnerability to get a Meterpreter session. Then, we will use the background command to go back to the msfconsole, where we can start exploring the available post-exploitation modules:
meterpreter > background [*] Backgrounding session 1...msf exploit(psexec) >
- Looking at the Metasploit structure, we can see that there are post-exploitation modules available for different target systems:
root@kali:~# ls /usr/share/metasploit-framework/modules/postaix android cisco firefox hardware linux multi osx solaris windows
- These exploitation modules are categorized by the tasks ...