Advanced extended features of Metasploit
Throughout this chapter, we've covered a lot of post-exploitation. Let's now cover some of the advanced features of Metasploit in this section.
Using pushm and popm commands
Metasploit offers two great commands, pushm
and popm
. The pushm
command pushes the current module on to the module stack, while popm
pops the pushed module from the top of the module stack; however, this is not the standard stack available to processes. Instead, it is the utilization of the same concept by Metasploit, but it's otherwise unrelated. The advantage of using these commands is speedy operations, which saves a lot of time and effort.
Consider a scenario where we are testing an internal server with multiple vulnerabilities. We have two exploitable services running on every system on the internal network. To exploit both services on every machine, we require a fast-switching mechanism between modules for both the vulnerabilities, without leaving the options. In such cases...