Summary
Throughout this chapter, we learned about post-exploitation in detail. We looked at the basics of post-exploitation, using transport as a fallback mechanism, and the differences between Linux and Windows Meterpreter commands. We covered the missing Meterpreter features for Linux and looked at extended features, such as sniffing traffic on the target host. We also looked at privileged escalation in both Windows and Linux environments, as well as a couple of other advanced techniques, such as harvesting nearby wireless devices and finding saved wireless credentials.
In the next chapter, we will make use of most of the post-exploitation tricks we covered in this chapter to circumvent and evade protection of the target system. We will perform some of the most cutting-edge Metasploit kung fu available and will try to defeat the AVs and firewalls we'll be up against.