Throughout this chapter, we looked at specialized tools and techniques that can aid law enforcement agencies. However, all these techniques must be carefully practiced as specific laws may restrict you while performing these exercises. Nevertheless, throughout this chapter, we covered how we could proxy Meterpreter sessions. We looked at APT techniques for gaining persistence, harvesting files from the target systems, using venom to obfuscate payloads, and how to cover tracks using anti-forensic third-party modules in Metasploit.
Try the following exercises:
- Try using Metasploit aggregator once its fixed officially
- Complete the code cave exercise and try binding legit DLLs to the payloads without crash the original application
- Build your own post-exploitation module for DLL planting method
In the upcoming chapter, we will switch to the infamous Armitage tool and will...