Post Exploitation

In previous chapters, we covered how to access devices through the use of various techniques. We will now move on to the post exploitation task, which will focus on the Meterpreter session and how we can exploit a target system once we have gained access to it. Then, we will look at the basic filesystem commands that can help us to exploit a target system.

Hitherto in this book, we have accessed a targeted system only to the point that a victim has our backdoor file or software running on their system. Now, we will look at how to maintain our access to the system, through both simple and advanced methods. We will even cover what can be done after performing a keylogging attack. Then, we will look at the important concept of pivoting, and we will use it to create an autoroute.

This chapter will cover the following topics:

  • An introduction to post exploitation 
  • Meterpreter basics
  • Filesystem commands
  • Maintaining access by using simple methods
  • Maintaining access by using advanced methods
  • Keylogging
  • An introduction to pivoting
  • Pivoting autoroutes
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.116.36.221