After successfully compromising a target, our next task is to start enumeration. Getting a session is only the beginning; with each new compromise, our target has a plethora of information which we, as penetration testers, can use to try to escalate our privileges and start pivoting to other targets in the internal network.
- We will start enumeration by using the Windows Gather Installed Application Enumeration post-exploitation module, which will enumerate all installed applications:
msf > use post/windows/gather/enum_applications msf post(enum_applications) > set SESSION 1 SESSION => 1 msf post(enum_applications) > run [*] Enumerating applications installed on VAGRANT-2008R2 Installed Applications ====================== Name Version ---- ------- 7-Zip 16.04(x64) 16.04 Java 8 Update 144 8.0.1440...