Post exploitation Introduction

Now we have learned how to gain access to our target machine. In this section, we are going to learn a number of things that can be done after we have gained access to a computer. We will look at what we do with the target computer regardless of how we gain access to it.

In the previous section, when we got a reverse Meterpreter session from our target, we always stopped. But in this section, we are going to start with a Meterpreter session. We will learn, what we can do after gaining access. We will be discussing how to maintain access to a target computer even if the target restarts the computer or the user uninstalls the vulnerable programs. We will look at how to download files, read files, upload files, open the webcam, start the keylogger to register keystrokes, and so on. We will also look at how to use a target computer as a pivot to exploit all computers on the same network. In this section, all the things that we are going to do will focus on after we have exploited a target?s vulnerabilities and have gained access to it.

In this section, we are going to cover the following topics:

  1. Basics of Meterpreter
  2. Filesystem commands
  3. Methods to Maintain access