🔍 Need help finding something? Please  search the site here.

About Post-Exploitation

Post-exploitation refers to any actions taken after a session is opened. A session  is an open shell from a successful exploit or bruteforce attack. A shell can be a standard shell or Meterpreter. To learn more about the difference between each, see Manage Meterpreter and Shell Sessions.  

Some of the actions you can take in an open session include:

  • Collect System Information
  • Pivot
  • Run Meterpreter Modules
  • Search the File System

Get a Session

You can get a new session by running a successful bruteforce attack , exploit , or social engineering campaign . A session opens a connection to the target host.

Bruteforce Attack

A session will be opened during a bruteforce attack if the option is selected during configuration. Go to **Credentials > Bruteforce, **then under “Options”, and check “Get session if possible”.

bruteforce_options.png

Exploit

To get a session with an exploit, you can use either an automated  or manual  exploit. Metasploit will automatically try to open a Meterpreter session for successful exploits. This setting can be changed under Connection Type when configuring an exploit.

exploit_payload.png

Social Engineering

A session will open on the target user’s computer if the campaign is configured  to deliver a file. Once a target user clicks on the file, the listener will open a session on their computer.

To see all available options, go to “Campaigns” and select **Custom Campaign. **From there, select the attack you want to run: Email, “Web Page”, or “Portable File”.

social_eng_options.png

Find Open Sessions

If you have already run a successful attack on a target host, you will find any active and closed sessions under “Sessions” in the top menu.

open_sessions.png