Let us start using the Meterpreter commands to understand their functionality. As it is a post-exploitation tool, we will require a compromised target to execute the commands. We will be using a Windows 7 machine as a target that we have exploited using browser vulnerability.
After compromising the Windows 7 target machine, we will have a Meterpreter session started as we have used the
windows/meterpreter/bind_tcp payload. We will start off by using a simple
? command that will list all the available Meterpreter commands, along with a short description:
meterpreter > ?
Take a quick look at the entire list. Many of the commands are self-explanatory.
Let us start with some ...