Post Exploitation with Metasploit
Gather system and Apps information
Gather passwords hashes and credentials
Modify the system
Escalate privileges
Last updated