Description: This is Part 5 of the Security Metasploit Framework Expert (SMFE) course material. You can begin by watching Part 1 here: http://www.securitytube.net/video/2556 . You can sign up for the course here http://www.securitytube.net/smfe Enjoy!
In this video, we will look at how to use Meterpreter in the post exploitation phase to dig deeper into the victim computer - configurations, users, idletime, are we in a virtual environment?, enumerating windows configurations etc.
Please do leave your comments behind :)