1 00:00:01,070 --> 00:00:06,440 ‫All right, we have now arrived at the time to use mature operator modules and commands. 2 00:00:06,920 --> 00:00:10,490 ‫So let's see what we can do in the post exploitation phase with an interpreter. 3 00:00:11,830 --> 00:00:16,420 ‫Now, there are numerous post exploitation tools on the interpreter session. 4 00:00:17,370 --> 00:00:23,300 ‫These extensions are classified according to what they're used for in the post exploitation phase. 5 00:00:24,330 --> 00:00:28,590 ‫With these extensions, the following operations can be performed on the target computer. 6 00:00:29,650 --> 00:00:33,700 ‫Privilege escalation, stealing different user tokens. 7 00:00:34,390 --> 00:00:35,890 ‫Gathering password hashes. 8 00:00:36,580 --> 00:00:38,590 ‫File upload and download. 9 00:00:39,600 --> 00:00:42,290 ‫Audio and video recording on the target system. 10 00:00:43,340 --> 00:00:47,990 ‫Logging keystrokes, et cetera, et cetera, et cetera, really. 11 00:00:48,910 --> 00:00:58,360 ‫The extensions of interpreter are a steady API, priv core, incognito and sniffer. 12 00:01:00,220 --> 00:01:04,840 ‫STD API, Priv and Core are loaded when the interpreter session open. 13 00:01:06,070 --> 00:01:12,220 ‫So when you run the help command on a matter for your session, the commands of the loaded extensions 14 00:01:12,220 --> 00:01:19,210 ‫are listed, the commands are classified by the extensions and their functions, which are file system 15 00:01:19,210 --> 00:01:22,330 ‫commands, network commands, etc.. 16 00:01:25,340 --> 00:01:29,720 ‫So you can use the load command to load and use the extensions, which are not loaded yet. 17 00:01:30,410 --> 00:01:36,530 ‫Now if you run help after loading an extension, you'll see the commands of the newly added extensions 18 00:01:36,530 --> 00:01:37,130 ‫as well.