Nytro Posted January 1, 2013 Report Posted January 1, 2013 Post Exploitation - System Information Gathering Description: In this video I will show you how to use Interesting Post – Exploitation Modules for Windows.So I’m going to use four Post – Exploitation Modules.1 post/windows/gather/enum_applicationsThis module will Dump All the list of Installed Application With Versions.2 post/windows/gather/usb_historyThis Module will show you victims USB_History.3 post/windows/gather/enum_devices This module for Enumerating Hardware.4 post/windows/gather/enum_chromeThis module is very interesting – using this module you will get all the information about chrome browser – Information like, Web Data, Coockie History, Login Data bookmarks, Preferences etc .. Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Sursa: Post Exploitation - System Information Gathering Quote