Post-exploitation modules can be run on compromised targets to enumerate targets, escalate privileges, gather credentials, pivot into target networks, and much more. Post modules replaced Meterpreter scripts that are obsolete and no longer supported.
Post-exploitation modules
Getting ready
With more than 300 post modules, Metasploit has become one of the most complete post tools in the world, and thanks to the community, it is growing at a fast pace.
How to do it...
Let's have a look at some post-exploitation modules and how to use them. In this recipe, we will use the Windows...