﻿1
00:00:00,660 --> 00:00:07,350
‫Métis Boyd has a wide array of post exploitation modules that can be run on compromised targets to gather

2
00:00:07,350 --> 00:00:11,280
‫evidence, pivot deeper into a target network and so much more.

3
00:00:11,760 --> 00:00:14,670
‫The modules are grouped under several groups.

4
00:00:15,380 --> 00:00:21,120
‫Escalate group includes modules that are used to escalate privilege and bypass the restrictions.

5
00:00:21,690 --> 00:00:24,840
‫The gathered group has the biggest number of modules.

6
00:00:25,260 --> 00:00:31,980
‫These modules are used to gather information from the compromised system and manage modules change the

7
00:00:31,980 --> 00:00:34,380
‫configuration of the victim's system.

8
00:00:35,430 --> 00:00:39,120
‫So let's see the modules first and then we'll run a few of them as examples.

9
00:00:40,430 --> 00:00:43,850
‫OK, so now I have an MSF consul in Colleano.

10
00:00:45,250 --> 00:00:51,790
‫Post modules are grouped by the operating systems, so let's search for the post modules for Windows

11
00:00:51,790 --> 00:00:52,450
‫first.

12
00:01:00,010 --> 00:01:06,730
‫Now, there are a lot of post modules for Windows systems and the module groups are W Land Recon manage.

13
00:01:11,310 --> 00:01:16,170
‫Escalate and capture now search for the Linux post module's.

14
00:01:24,050 --> 00:01:29,810
‫The Linnik specific post modules are not as many as Windows specific post modules, but still it's not

15
00:01:29,810 --> 00:01:31,990
‫bad at all, gives you something to do anyway.

16
00:01:33,830 --> 00:01:37,190
‫The next search is for the post of modules of OS X.

17
00:01:41,850 --> 00:01:48,810
‫And here are the U.S. specific post modules in groups captured gather and manage, so that will search

18
00:01:48,810 --> 00:01:50,400
‫for post multi.

19
00:01:56,980 --> 00:02:01,000
‫These modules can be run for more than one operating system.

