-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Metasploit Bootcamp
By :

We have already covered a few of the post-exploitation modules in the previous chapters. However, here we will focus on the features that we did not cover. Throughout the last chapter, we focused on exploiting the systems, but now we will focus only on the systems that are already exploited. So, let us get started with the most basic commands used in post-exploitation in the next section.
The core meterpreter commands are those that are available on most of the exploited systems using a meterpreter payload, and provide the necessary core functionalities for post-exploitation. Let us get started with some of the most basic commands that will help you with post-exploitation.
We can always refer to the help menu's list of all the various commands that are usable on the target by issuing help
or ?
, as shown in the following screenshot:
While carrying out post-exploitation, we may run into a...
Change the font size
Change margin width
Change background colour