About Post-Exploitation

Post-exploitation refers to any actions taken after a session is opened. A session is an open shell from a successful exploit or bruteforce attack. A shell can be a standard shell or Meterpreter. To learn more about the difference between each, see Manage Meterpreter and Shell Sessions.

Some of the actions you can take in an open session include:

  • Collect System Information
  • Pivot
  • Run Meterpreter Modules
  • Search the File System

Get a Session

You can get a new session by running a successful bruteforce attack, exploit, or social engineering campaign. A session opens a connection to the target host.

Bruteforce Attack

A session will be opened during a bruteforce attack if the option is selected during configuration. Go to **Credentials > Bruteforce, **then under “Options”, and check “Get session if possible”.

Exploit

To get a session with an exploit, you can use either an automated or manual exploit. Metasploit will automatically try to open a Meterpreter session for successful exploits. This setting can be changed under Connection Type when configuring an exploit.

Social Engineering

A session will open on the target user’s computer if the campaign is configured to deliver a file. Once a target user clicks on the file, the listener will open a session on their computer.

To see all available options, go to “Campaigns” and select **Custom Campaign. **From there, select the attack you want to run: Email, “Web Page”, or “Portable File”.

Find Open Sessions

If you have already run a successful attack on a target host, you will find any active and closed sessions under “Sessions” in the top menu.