-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Mastering Metasploit
By :

Metasploit offers 250 plus post-exploitation modules; however, we will only cover a few interesting ones and will leave the rest for you to cover as an exercise.
Wireless networks around the target system can be discovered efficiently using the wlan_bss_list
module. This module allows us to fingerprint the location and other necessary information about the Wi-Fi networks around the target. We can issue the run post/windows/wlan/wlan_bss_list
command to do this, as shown in the following screenshot:
Figure 8.31 – Harvesting nearby Wi-Fi networks using the wlan_bss_list post-exploitation module
Let's also see how we can gather stored wireless passwords with Metasploit.
Similar to the preceding module, we have the wlan_profile
module, which collects all saved credentials for the Wi-Fi from the target system...