Home » Tools » 25. Metasploit Framework Tools » 6. Post Modules

6. Post Modules

Description:
Post-exploitation modules are used to gather information or exploit a compromised system further. They include modules for credential harvesting, privilege escalation, and network pivoting.

Examples:

    1. Run a Post Module:
      • use post/windows/gather/enum_logged_on_users
      • set SESSION 1
      • run

Explanation: Uses the post-exploitation module to enumerate logged-on users on the compromised Windows target (session 1).

Scroll to Top