Chapter 10: Metasploit for Secret Agents
This chapter brings in a variety of techniques that will mostly be used by law enforcement agencies. The methods discussed in this chapter will extend the usage of Metasploit to surveillance and offensive cyber operations. Throughout this chapter, we will look at the following:
- Maintaining anonymity in Meterpreter sessions
- Maintaining access using Search Order Hijacking in standard software
- Harvesting files from target systems
- Using Venom for obfuscation
- Covering tracks with anti-forensics modules
Maintaining anonymity in Meterpreter sessions is a must for law enforcement agents. Metasploit offers modules that can aid agencies to anonymize access without leaving a trail. In an upcoming section, we will discuss how we can anonymize sessions using proxy servers. So, let's get started.