Uictl enables control of some of the user interface components Step 6: Privilege Escalation Commands getsystem uses 15 built-in methods to gain sysadmin privileges Step 7: Password Dump Commands hashdump grabs the hashes in the password (SAM) file Set_desktop changes the meterpreter desktop Screenshot grabs a screenshot of the meterpreter desktop Keyscan_stop stops the software keylogger Keyscan_start starts the software keylogger when associated with a process such as Word or browser Keyscan_dump dumps the contents of the software keylogger Idletime checks to see how long since the victim system has been idle Getdesktop get the current meterpreter desktop Sysinfo gets the details about the victim computer such as OS and name Step 5: User Interface Commands enumdesktops lists all accessible desktops Steal_token attempts to steal the token of a specified (PID) process Shutdown shuts down the victim's computer Shell opens a command shell on the victim machine Rev2self calls RevertToSelf() on the victim machine Kill terminate the process designated by the PID Getuid get the user that the server is running as Getprivs gets as many privileges as possible Route view or modify the victim routing table Step 4: System Commands clearev clears the event logs on the victim's computer Portfwd forwards a port on the victim system to a remote service Upload upload a file from the attacker system to the victim Step 3: Networking Commands ipconfig displays network interfaces with key information including IP address, etc. Rmdir remove directory on the victim system Mkdir make a directory on the victim system Write writes data to a channel Step 2: File System Commands cat read and output to stdout the contents of a fileĭownload download a file from the victim system to the attacker system Run executes the meterpreter script designated after it Migrate moves the active process to a designated PID Here are some of the core commands we can use on the meterpreter: ? help menuīackground moves the current session to the backgroundīgkill kills a background meterpreter scriptīglist provides a list of all running background scriptsīgrun runs a script as a background threadĮxploit executes the meterpreter script designated after it As such, many of our basic Linux commands can be used on the meterpreter even if it's on a Windows or other operating system. Step 1: Core CommandsĪt its most basic use, meterpreter is a Linux terminal on the victim's computer. Hack a system and have fun testing out these commands. With the meterpreter on the target system, you have nearly total command of the victim.Īs a result, several of you have asked me for a complete list of commands available for the meterpreter because there doesn't seem to be a complete list anywhere on the web. I've done numerous tutorials in Null Byte demonstrating the power of Metasploit's meterpreter.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |