Basics of post-exploitation with Metasploit
We have already covered many post-exploitation modules and scripts in the previous chapters. In this chapter, we will focus on the features that we did not include previously. So, let's get started with the most basic commands used in post-exploitation in the next section.