O'Reilly logo

Metasploit Penetration Testing Cookbook - Second Edition by Abhinav Singh, Monika Agarwal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding the Meterpreter system commands

Let us start using the Meterpreter commands to understand their functionality. As it is a post-exploitation tool, we will require a compromised target to execute the commands. We will be using a Windows 7 machine as a target that we have exploited using browser vulnerability.

Getting ready

After compromising the Windows 7 target machine, we will have a Meterpreter session started as we have used the windows/meterpreter/bind_tcp payload. We will start off by using a simple ? command that will list all the available Meterpreter commands, along with a short description:

meterpreter > ? 

Take a quick look at the entire list. Many of the commands are self-explanatory.

How to do it...

Let us start with some ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required