1 00:00:03,860 --> 00:00:08,510 Now, there are numerous post exploitation tools on the interpreter session. 2 00:00:09,430 --> 00:00:15,370 These extensions are classified according to what they're used for in the post exploitation phase. 3 00:00:16,390 --> 00:00:20,680 With these extensions, the following operations can be performed on the target computer. 4 00:00:21,740 --> 00:00:29,720 Privilege, escalation, stealing different user tokens, gathering password hashes, file, upload 5 00:00:29,720 --> 00:00:30,680 and download. 6 00:00:31,630 --> 00:00:34,360 Audio and video recording on the target system. 7 00:00:35,400 --> 00:00:40,080 Logging keystrokes, et cetera, et cetera, et cetera, really. 8 00:00:41,000 --> 00:00:50,420 The extensions of the interpreter are stored API, priv, core, incognito and sniffer. 9 00:00:52,730 --> 00:00:56,930 API, priv and core are loaded when the interpreter session open. 10 00:00:58,120 --> 00:01:04,420 So when you run the Help command on Immaturities session, the commands of the loaded extension's are 11 00:01:04,420 --> 00:01:11,860 listed, the commands are classified by the extension's and their functions, which are filesystem commands, 12 00:01:12,040 --> 00:01:14,440 network commands, etc.. 13 00:01:17,370 --> 00:01:21,780 So you can use the load command to load and use the extensions, which are not loaded yet. 14 00:01:22,440 --> 00:01:28,590 Now, if you run help after loading an extension, you'll see the commands of the newly added extensions 15 00:01:28,590 --> 00:01:29,190 as well.