Chapter 8: Metasploit Extended

This chapter will cover the extended usage and hardcore post-exploitation features of Metasploit. Throughout this chapter, we will focus on out-of-the-box approaches toward post-exploitation, as well as tedious tasks such as privilege escalation, using transports, finding juicy information, and much more.

During this chapter, we will cover and understand the following key aspects:

  • Basic Windows post-exploitation commands
  • Differences between Windows and Linux post-exploitation commands
  • Advanced Windows post-exploitation modules
  • Advanced multi-OS extended features of Metasploit
  • Privilege escalation with Metasploit on Windows 10 and Linux

We covered many post-exploitation modules and scripts in the previous chapters. ...

Get Mastering Metasploit - Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.