6. Post Modules
Description:
Post-exploitation modules are used to gather information or exploit a compromised system further. They include modules for credential harvesting, privilege escalation, and network pivoting.
Examples:
- Run a Post Module:
- use post/windows/gather/enum_logged_on_users
- set SESSION 1
- run
- Run a Post Module:
Explanation: Uses the post-exploitation module to enumerate logged-on users on the compromised Windows target (session 1).