Use modules to search for stored passwords or SSH keys.
"Post" refers to , which are used after you have already gained a session on a target host. These modules are used to gather information, such as passwords or hashes (digital "keys"), from the compromised system. Common uses: Clave MatSploit
From an active session, use run post/windows/gather/enum_domain to gather domain information. 3. API and License Keys Use modules to search for stored passwords or SSH keys
Extract sensitive configuration keys from the Windows registry. Clave MatSploit