September 2018
Intermediate to advanced
480 pages
9h 45m
English
Once the agent is connected back to the Empire C2, we can start with our post exploitation process using the Empire modules. The post exploitation modules can be categorized into two parts:
Let's see the following table to get more clarity about the post modules in Empire and how they are further categorized:
| Module category | PowerShell | Python |
| Code Execution | √ | × |
| Collection | √ | √ |
| Credentials | √ | × |
| Exfiltration | √ | × |
| Exploitation | √ | √ |
| Lateral Movement | √ | √ |
| Persistence | √ | √ |
| Management | √ | √ |
| Privilege Escalation | √ | √ |
| Situational Awareness | √ | √ |
| Trollsploit | √ | √ |
| Recon | √ | × |
Every module category mentioned in the preceding table has sub-modules ...