Meterpreter
short for Meta-Interpreter: Powerful shell runs on (x86, x64) Android, BSD, Java, Linux, PHP, Python & Windows. Able to gather info, Transfer files, install backdoors ...etc .
List all Meterpreters:
search meterpreterChoose payload
set payload <your_meterpreter>To get the Meterpreter session you must run the exploit. (as shown in Metasploit)
exploitSessions:
switch from Meterpreter session to the msf:
backgroundlist all the sessions in msf:
resume a background session:
🔍Recon with Meterpreter:
System info:
Print network config.:
Get routing table
which user is running the process you exploited
Privilege Escalation:
Run privilege escalation routine (if user is not privileged):
bypass UAC:
inside a Meterpreter session you can use the following to see your privileges:
Remain Stealthy:
🔑Dumping Password Database (hashes):
Dumbing Victim .bash_history
🚶♂️Exploring the Victim System:
navigation:
Downloading & Uploading:
Running the OS Shell
Help
Last updated