Metasploit offers 250+ post-exploitation modules. However, we will only cover a few interesting ones and will leave the rest for you.
Wireless networks around the target system can be discovered easily using the wlan_bss_list
module. This allows us to fingerprint location and other important information about the target as follows:
Similar to the preceding module, we have the wlan_profile
module, which gathers all saved credentials for Wi-Fi from the target system. We can use the module as follows:
We can see the name of the network in the <name> tag, and the password in the <keyMaterial> tag in the preceding screenshot.