Windows

Common Metasploit Modules

use post/windows/gather/win_privs
# Enumerates the current user's privileges on a Windows system.

use post/windows/gather/enum_logged_on_users
# Lists all users currently logged into the compromised Windows machine.

use post/windows/gather/checkvm
# Detects whether the target system is running inside a virtual machine.

use post/windows/gather/enum_applications
# Retrieves a list of installed applications on the target Windows machine.

use post/windows/gather/enum_computers
# Enumerates computers in the compromised system’s domain or network.

use post/windows/gather/enum_shares
# Lists shared folders and resources available on the target machine.

Last updated