Metasploit
Post Exploitation Workflow
Check group members
Load Powershell Extension
Spawn a powershell.exe in your meterpreter session, just like running shell command to spawn cmd.exe in your session
Dump windows users NTLM hashes
Last updated
Was this helpful?