If you gain access to a target system that a runs virtual environment, Metasploit Pro captures screenshots of the guest operating systems on the host system. To view the screenshots of the guest operating systems, go to Analysis > Host s > Captured Evidence. The Captured Evidence tab displays a list of looted evidence, such as screenshots from virtual machines.
![]() |