O'Reilly logo

Learning Metasploit Exploitation and Development by Aditya Balapure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Meterpreter in action

In Chapter 3, Exploitation Basics, we were able to exploit the victim machine and get a Meterpreter session from it. Now we will use this Meterpreter session to leverage the various functionalities of the Metasploit Framework.

Meterpreter in action

We will now display all the weapons of attack that Meterpreter hosts. For this, enter help.

Meterpreter in action

In the preceding screenshot, we see all of the Meterpreter commands that can be used on the compromised system.

We have a few classified commands based on their usage; they are listed as follows:

Command type

Command ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required