![What you can do after you hacked a computer? (post-exploitation techniques part-2) | by David Artykov | Purple Team | Medium What you can do after you hacked a computer? (post-exploitation techniques part-2) | by David Artykov | Purple Team | Medium](https://miro.medium.com/v2/resize:fit:1400/1*nnXbWRle-D--MJl0u6Ssaw.png)
What you can do after you hacked a computer? (post-exploitation techniques part-2) | by David Artykov | Purple Team | Medium
![Metasploitable 2.0 Tutorial Part 2: Scanning for Network Services with Metasploit – CYBER ARMS – Computer Security Metasploitable 2.0 Tutorial Part 2: Scanning for Network Services with Metasploit – CYBER ARMS – Computer Security](https://cyberarms.files.wordpress.com/2012/08/ftp-scanner.png)
Metasploitable 2.0 Tutorial Part 2: Scanning for Network Services with Metasploit – CYBER ARMS – Computer Security
![Metasploit Auxiliaries for Web Application enumeration and scanning - Metasploit Revealed: Secrets of the Expert Pentester [Book] Metasploit Auxiliaries for Web Application enumeration and scanning - Metasploit Revealed: Secrets of the Expert Pentester [Book]](https://www.oreilly.com/api/v2/epubs/9781788624596/files/assets/15d23931-4396-4e2e-8b6e-6c4a90c7f021.jpg)
Metasploit Auxiliaries for Web Application enumeration and scanning - Metasploit Revealed: Secrets of the Expert Pentester [Book]
![Scanning internal networks through a meterpreter pivot - Metasploit Revealed: Secrets of the Expert Pentester [Book] Scanning internal networks through a meterpreter pivot - Metasploit Revealed: Secrets of the Expert Pentester [Book]](https://www.oreilly.com/api/v2/epubs/9781788624596/files/assets/13957763-b34a-4094-a9d3-8f3d32c278ea.png)