🛠️
Hacking tools
  • Welcome!
  • Nmap
    • Nmap - Intro
    • Commands
    • Nmap Switches
    • Nmap Scripting Engine
  • Metasploit
    • Metasploit - Intro
    • Metasploit Framework Console
    • Msfvenom
    • Meterpreter
  • Netcat
    • Netcat - Intro
    • Netcat - Advanced
  • John the Ripper
    • John the Ripper - Intro
    • John the Ripper - Commands
  • Web Directory Fuzzers
    • Gobuster
    • Ffuf
  • Hydra
    • Hydra - Intro
    • Hydra - Commands
  • SQLMap
Powered by GitBook
On this page
  • Introduction
  • Commands
  1. Metasploit

Meterpreter

Introduction

Meterpreter is a metasploit attack payload that provides an interactive shell from which an attacker can explore the target machine and execute code after successful execution of payload in the target machine and creation of meterpreter session or prompt.

Commands

These are the commands that can be used in the meterpreter prompt.

  1. help

It displays the help menu. The help menu has different codes related to core commands, file system commands, user interface commands, system commands, networking commands, webcam commands, audio output commands, elevation commands, password database commands, timestamp commands.

  1. getuid

It gets the session GUID (Globally Unique Identifier) for knowing the privilege level.

  1. ps

It lists the running processes.

  1. migrate [pid]

It migrates to interact with other processes with specific process id (pid).

  1. hashdump

It lists the context of SAM (Security Account Manager) database, that stores user's password on Windows system.

  1. search -f [file_name]

It is used to locate a particular file.

  1. shell

It launches the regular command line shell on the target system.

PreviousMsfvenomNextNetcat - Intro

Last updated 11 months ago