Veil-Pillage is a module that was developed as part of the main Veil framework that can be utilized by the attackers during post-exploitation. In this section, we will take a quick look at how Veil-Pillage is organized and the different type of modules that can be utilized to achieve our goal of penetration testing. The following diagram describes the different sections of the Veil-Pillage framework:
Further details regarding all the modules available in the pillage framework are as follows:
- Credentials: Provides a list of modules that can be utilized to grab all the credentials and hash dump of a compromised system with a valid ...