This chapter will feature hard-core post-exploitation. Throughout this chapter, we will focus on approaches to post-exploitation, and will cover basic tasks, such as privilege escalation, getting passwords in clear text, finding juicy information, and much more.
During this chapter, we will cover and understand the following key aspects:
- Performing necessary post-exploitation
- Using advanced post-exploitation modules
- Privilege escalation
- Gaining persistent access to the targets
Let us now jump into the next section, where we will look at the basics of the post-exploitation features of Metasploit.