Getting ready

The data stored in the registry varies according to the version of Microsoft Windows, so you need to take that into account when interacting with the target system.

By looking at the registry, you can find what files have been used, websites visited using Internet Explorer, programs used, USB devices used, and much more.

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.