Now that we have our browser or target hooked, we can go to the Commands tab and start executing commands on the target:
We can use the Search option to look for a certain command, or we can use the categories and look for commands suitable for what we want to perform on the target computer. Some of the commands are information-gathering commands, some of them are social engineering, some of them will even give us full control over the target computer. There are a lot of commands, so we won't be able to go over all of them, but we will be looking at some of the most important commands so we know how to experiment and run them.
If we click on the Browser (53) option, we will see commands related to attacks that we can do inside the browser:
We can see attacks that will allow us to get a screenshot, we can try to turn on the webcam and see whether...