Metasploit was developed to support both exploit and post-exploit activities. The present version contains approximately 183 Windows modules that simplify post-exploit activities. We will review some of the most important modules here.
In the following screenshots, we have successfully exploited a Windows 2008 R2 (a classic attack that is frequently used to validate more complex aspects of meterpreter). The initial step is to conduct an immediate reconnaissance of the network and the compromised system.
The initial Meterpreter shell is fragile and vulnerable to failure over an extended period of time. Therefore, once a system has been exploited, we need to migrate the shell and bind it with a more stable process. ...