In Chapter 3, Exploitation Basics, we were able to exploit the victim machine and get a Meterpreter session from it. Now we will use this Meterpreter session to leverage the various functionalities of the Metasploit Framework.
We will now display all the weapons of attack that Meterpreter hosts. For this, enter
In the preceding screenshot, we see all of the Meterpreter commands that can be used on the compromised system.
We have a few classified commands based on their usage; they are listed as follows: