In the previous recipe, we saw how Armitage can be useful in handling multiple targets. Once the targets are exploited, our next step will be to perform various post-exploitation activities. Let us see how Armitage can be handy in the post exploitation phase as well.
We will analyze our exploited Windows XP target and see how we can perform several post-exploitation activities on it.
Once a target has been exploited, we can follow several meterpreter options by right- clicking on its image. There are some commonly used post-exploitation actions available to us such as access, interact, and pivot. We can perform several actions by just making a few clicks. Let us perform the first and most essential phase of post exploitation—privilege escalation. We can find this option by right-clicking on the target image and navigating to Meterpreter | Access | Escalate privileges. Another interesting post-exploitation activity is screenshot which...