Clave Matsploit Info
Use modules to search for stored passwords or SSH keys.
If you are using , you may need a License Key to activate the software or an API Token to connect the Metasploit Web Service to other tools. Metasploitable 2 Exploitability Guide - Docs | © Rapid7 Clave MatSploit
From an active session, use run post/windows/gather/enum_domain to gather domain information. 3. API and License Keys Use modules to search for stored passwords or SSH keys
"Post" refers to , which are used after you have already gained a session on a target host. These modules are used to gather information, such as passwords or hashes (digital "keys"), from the compromised system. Common uses: Common uses: Extract sensitive configuration keys from the
Extract sensitive configuration keys from the Windows registry.
If you are looking to create a "key" or executable to gain access to a system, use the generate command within the msfconsole . This command allows you to customize a payload with specific encoders and options. Load a payload: use payload/windows/shell_bind_tcp View options: generate -h Generate the code: generate -f exe -o payload.exe 2. Post-Exploitation Modules ( post modules)



