Windows AV Enumeration Module
TARGET: Windows
4 MODULE : POST
TYPE: Local
ANTI-MALWARE : OFF
As you already understood by reading the name of the module, this exploit module will enumerate all installed Antivirus applications on the target Windows OS. For this module to work, we need to already have a meterpreter session on the target as shown. Let’s see how this module works.
Background the current meterpreter session and load the post/windows/gather/enum_av_excluded POST module.
Set the session ID of the meterpreter session and execute the module.
As you can already see, the module correctly detected the AV product installed on the target system. It is Windows Defender.
Windows Gather Bookmarks Module
TARGET: Google, chrome, Opera, Microsoft Edge
TYPE: Local
MODULE : POST
ANTI-MALWARE : OFF
This module retrieves the…
