From the course: Penetration Testing with Metasploit
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Using post-exploitation modules - Metasploit Tutorial
From the course: Penetration Testing with Metasploit
Using post-exploitation modules
- Hi, everyone. Welcome to this new and last module of our penetration testing course, with metasploit post exploitation using Metasploit. In this module, We will look at the post exploitation features that we can use and leverage once we have successfully infiltrated any system, just to add some context, I have three sessions available on a windows environment that we compromised in the previous sections. We have two remote shells and one met operator session. Let us look at some post modules available with Metasploit type would be post platform would be windows to start from the beginning, We have post exploitation for managing, for information gathering for capturing certain activities. We have privilege escalation attacks further to down, We have gathering based attacks, which gather some information out of the target environment. We have reverse lookup just to sum up. We have we'll have lots…