meterpreter > run post/windows/gather/hashdump The hashdump post module will dump the contents of the SAM database. Running getuid will display the user that the Meterpreter server is running as on the host. The execute command runs a command on the target. Please refer to the vim editor documentation for more advance use. It uses the ‘vim’ so all the editor’s commands are available. The edit command opens a file located on the target host. downloaded : c:\boot.ini -> c:\boot.ini/boot.ini Note the use of the double-slashes when giving the Windows path. The download command downloads a file from the remote machine. There are no options or arguments.Īfter using Meterpreter to clear the logs | Metasploit Unleashed The clearev command will clear the Application, System, and Security logs on a Windows system.
Meterpreter > cd c:\windows meterpreter > pwd
The change directory “cd” works the same way as it does under DOS and *nix systems.īy default, the current working folder is where the connection to your listener was initiated.ĪRGUMENTS: cd: Path of the folder to change to The cd and pwd commands are used to change and display current working directly on the target host. It displays the content of a file when it’s given as an argument. The cat command is identical to the command found on *nix systems. Msf exploit( ms08_067_netapi) > sessions -i 1 To get back to your Meterpreter session, just interact with it again. The background command will send the current Meterpreter session to the background and return you to the ‘msf’ prompt. meterpreter > helpīackground Backgrounds the current sessionĬhannel Displays information about active channels The help command, as may be expected, displays the Meterpreter help menu. For those that aren’t covered, experimentation is the key to successful learning. Throughout this course, almost every available Meterpreter command is covered. Since the Meterpreter provides a whole new environment, we will cover some of the basic Meterpreter commands to get you started and help familiarize you with this most powerful tool. Security Operations for Beginners (SOC-100).Exploit Development Prerequisites (EXP-100).