Metasploit offers 250 plus post-exploitation modules; however, we will only cover a few interesting ones, and will leave the rest for you to cover as an exercise.
Additional post-exploitation modules
Gathering wireless SSIDs with Metasploit
Wireless networks around the target system can be discovered efficiently using the wlan_bss_list module. The module allows us to fingerprint the location and other necessary information about the Wi-Fi networks around the target, as shown in the following screenshot:
![](https://static.packt-cdn.com/products/9781788990615/graphics/assets/e77a1f4c-e85b-4c1d-9f4c-4f82bd014271.png)
Gathering Wi-Fi passwords with Metasploit
Similar to the preceding...