From the course: Metasploit Essential Training

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Using post-exploitation modules

Using post-exploitation modules

- So after we have exploited a machine then of course it's important to understand about post exploitation, and of course a few other bits and pieces that we'll talk about as well. So post exploitation is really what we decide to do after we've performed an exploitation. So we're just going to go ahead and run the standard exploitation that we've used before. We're going to default it to a windows/meterpreter shell, for example. And what we'll do is obviously set RHOSTS, which is the machine that we're trying to get to, so 10.100.10.105. We'll set our LHOST, which is the listening one, to our machine here. We'll set the LPORT to be the standard one we've been using. We'll set our SMBUSER, 'cause we already know this one, so trainer. And we'll set our SMB password for that account, like so. And then we'll just click run and exploit that one. And this will go ahead and connect to our Windows machine that we've been…

Contents