Chapter 5. Using Meterpreter to Explore the Compromised Target

In this chapter, we will cover the following:

  • Analyzing meterpreter system commands
  • Privilege escalation and process migration
  • Setting up multiple communication channels with the target
  • Meterpreter filesystem commands
  • Changing file attributes using timestomp
  • Using meterpreter networking commands
  • The getdesktop and keystroke sniffing
  • Using a scraper meterpreter script

Introduction

So far we have laid more stress on the pre-exploitation phase in which we tried out various techniques and exploits to compromise our target. In this chapter, we will lay stress on the post-exploitation phase—what we can do after we have exploited the target machine. Metasploit provides a very powerful post-exploitation ...

Get Metasploit Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.