Path: blob/master/documentation/modules/post/windows/gather/psreadline_history.md
27880 views
Vulnerable Application
This post-exploitation module will extract PowerShell history.
Verification Steps
Start
msfconsoleGet meterpreter session
Do:
use post/windows/gather/psreadline_historyDo:
set SESSION <session id>Do:
runYou should be able to see the extracted PowerShell history in the loot files
Options
SESSION - The session to run the module on.
Scenarios
Using the module with a version earlier than PowerShell 5.0
In this scenario the module won't be able to work, as in earlier versions of PowerShell, the history of the commands in the current session is not being saved after it is closed.
Using the module with PowerShell 5.0+
In this scenario the module will try to extract the history file and save it in a loot file.
The extracted history data would look like this: