Post-exploitation modules

So far, we have worked a lot on the post exploitation phase using various powers of meterpreter. However, we also have a separate dedicated list of modules that can enhance our penetration testing experience. As they are post exploitation modules, we will need an active session with our target. We can use any of the methods described in previous chapters to gain access to our target.

Getting ready

The post module is a collection of some of the most interesting and handy features that you can use while penetration testing. Let us quickly analyze some of them here. Here we are using an unpatched Windows 7 machine as our target with an active meterpreter session.

How to do it...

You can locate the post modules in modules/post/windows/gather ...

Get Metasploit Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.