Modules : About Modules : Module Types : Post-Exploitation Modules

Post-Exploitation Modules
A post-exploitation module enables you to gather more information or to gain further access to an exploited target system. Examples of post-exploitation modules include hash dumps and application and service enumerators.