Metasploit offers 250 plus post-exploitation modules; however, we will only cover a few interesting ones, and will leave the rest for you to cover as an exercise.
Additional post-exploitation modules
Gathering wireless SSIDs with Metasploit
Wireless networks around the target system can be discovered efficiently using the wlan_bss_list module. The module allows us to fingerprint the location and other necessary information about the Wi-Fi networks around the target, as shown in the following screenshot:
Gathering Wi-Fi passwords with Metasploit
Similar to the preceding module, we have...