Post-exploitation with Armitage

In the previous recipe, we saw how Armitage can be useful in handling multiple targets. Once the targets are exploited, our next step will be to perform various post-exploitation activities. Let us see how Armitage can be handy in the post exploitation phase as well.

Getting ready

We will analyze our exploited Windows XP target and see how we can perform several post-exploitation activities on it.

How to do it...

Once a target has been exploited, we can follow several meterpreter options by right- clicking on its image. There are some commonly used post-exploitation actions available to us such as access, interact, and pivot. We can perform several actions by just making a few clicks. Let us perform the first and most ...

Get Metasploit Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.