O'Reilly logo

Metasploit Penetration Testing Cookbook by Abhinav Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using meterpreter networking commands

Meterpreter provides us some useful networking commands as well. These commands can be useful in understanding the network structure of the target user. We can analyze whether the system belongs to a LAN or it is a standalone system. We can also know the IP range, DNS, and other information as well. Such network information can be useful when we have to perform pivoting. Pivoting is a concept by which we can compromise other machines on the same network in which our target is present. We will understand pivoting in our next chapter where we will focus on the advanced use of meterpreter.

Getting ready

Before we get into the recipe, there are three networking terms which we will encounter here. So let us give ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required