O'Reilly logo

Learning Metasploit Exploitation and Development by Aditya Balapure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Post Exploitation

In the previous chapter, we were able to compromise the system and get access to the meterpreter. Now once we have access to the system, our main focus lies on extracting as much information as we can from the system, while at the same time being invisible to the user. This would include information that can be analyzed offline on the attacker system, such as a Windows registry dump, password hash dump, screenshots, and audio recordings. In this chapter, we will explain the concept of post exploitation and its phases in detail. We will further be covering a tutorial on the various techniques of post exploitation.

What is post exploitation?

As the term suggests, post exploitation basically means the phases of operation ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required