Throughout this chapter, we covered post-exploitation in detail. We looked at post-exploitation scenarios, from basic to advanced. We also looked at privileged escalation in a Windows environment, and a couple of other advanced techniques.
Following are the exercises you should try on your own:
- Develop your own post-exploitation modules for the features which are not already present in Metasploit
- Develop automation scripts for gaining access, maintaining access, and clearing tracks
- Try contributing to Metasploit with at least one post-exploitation module for Linux based operating systems
In the next chapter, we will make use of most of the post-exploitation tricks we covered in this chapter to circumvent and evade protections at the target system. We will perform some of the most cutting-edge Metasploit Kung Fu, and will try to defeat the AVs and firewalls...