Description: In this video I will show you how to use Interesting Post – Exploitation Modules for Windows.
So I’m going to use four Post – Exploitation Modules.
1 post/windows/gather/enum_applications
This module will Dump All the list of Installed Application With Versions.
2 post/windows/gather/usb_history
This Module will show you victims USB_History.
3 post/windows/gather/enum_devices
This module for Enumerating Hardware.
4 post/windows/gather/enum_chrome
This module is very interesting – using this module you will get all the information about chrome browser – Information like, Web Data, Coockie History, Login Data bookmarks, Preferences etc ..
Tags: hacking , post-exploitaiton , metasploit , framework ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.