Learning Metasploit Exploitation and Development by Balapure Aditya

Learning Metasploit Exploitation and Development by Balapure Aditya

Author:Balapure, Aditya [Balapure, Aditya]
Language: eng
Format: epub
Publisher: Packt Publishing
Published: 0101-01-01T00:00:00+00:00


Summary

In this chapter, we went through the first phase of post exploitation in which we made an attempt to understand our victim better. Once we had the meterpreter session running, we leveraged it to gather important system information, hardware details, and so on. We used meterpreter scripts to dump the Windows registry and the password hashes. The attacker was able to get a list of the programs installed on the victim's machine. Using post exploitation techniques, we were able to enumerate the victim's hard disk information, including the physical and logical partitions. Further penetrating into the victim's system, we could gather the network information and make changes to the host's record file. In the next chapter, we will move on to the next phase of post exploitation: privilege escalation.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.