We won’t cover all the details of the post exploitation module because it is nearly identical to the attack shown in Chapter 13. Carefully walk through each line, and then try to build and run your own module.
Walk through existing Meterpreter scripts and look at the different commands, calls, and functions that can be used to create your own script. If you come up with a great idea for a new script, submit it to the Metasploit development team—who knows; it might be a script that others can use!