Post-exploitation modules
So far, we have worked a lot on the post exploitation phase using various powers of meterpreter. However, we also have a separate dedicated list of modules that can enhance our penetration testing experience. As they are post exploitation modules, we will need an active session with our target. We can use any of the methods described in previous chapters to gain access to our target.
Getting ready
The post module is a collection of some of the most interesting and handy features that you can use while penetration testing. Let us quickly analyze some of them here. Here we are using an unpatched Windows 7 machine as our target with an active meterpreter session.
How to do it...
You can locate the post modules in modules/post/windows/gather
. Let us start with a simple enum_logged_on_users
module. This post module will list the current logged in users in the Windows machine.
We will execute the module through our active meterpreter session. Also, keep in mind to escalate...