﻿1
00:00:01,040 --> 00:00:07,430
‫All right, we have now arrived at the time to use mature operator modules and commands, so let's see

2
00:00:07,430 --> 00:00:09,590
‫what we can do in the post exploitation phase.

3
00:00:09,590 --> 00:00:10,490
‫With Interpreter.

4
00:00:11,800 --> 00:00:16,450
‫Now, there are numerous post exploitation tools on the interpreter session.

5
00:00:17,370 --> 00:00:23,310
‫These extensions are classified according to what they're used for in the post exploitation phase.

6
00:00:24,330 --> 00:00:28,620
‫With these extensions, the following operations can be performed on the target computer.

7
00:00:29,680 --> 00:00:37,660
‫Privilege, escalation, stealing different user tokens, gathering password hashes, file, upload

8
00:00:37,660 --> 00:00:38,650
‫and download.

9
00:00:39,570 --> 00:00:42,300
‫Audio and video recording on the target system.

10
00:00:43,370 --> 00:00:48,020
‫Logging keystrokes, etc, et cetera, et cetera, really.

11
00:00:48,940 --> 00:00:58,360
‫The extensions of the interpreter are stored API, priv, core, incognito and sniffer.

12
00:01:00,670 --> 00:01:04,870
‫API, priv and core are loaded when the interpreter session open.

13
00:01:06,070 --> 00:01:12,820
‫So when you run the help command on a materialisation, the commands of the loaded extension's are listed,

14
00:01:13,660 --> 00:01:19,810
‫the commands are classified by the extension's and their functions, which are filesystem commands,

15
00:01:19,990 --> 00:01:22,350
‫network commands, et cetera.

16
00:01:25,310 --> 00:01:29,720
‫So you can use the load command to load and use the extensions, which are not loaded yet.

17
00:01:30,380 --> 00:01:36,530
‫Now, if you run help after loading an extension, you'll see the commands of the newly added extensions

18
00:01:36,530 --> 00:01:37,150
‫as well.

