Links

Post Exploitation with Metasploit

Gather system and Apps information

Gather passwords hashes and credentials

Modify the system

Escalate privileges