Chapter 6. Advanced Meterpreter Scripting

In this chapter, we will cover:

  • Passing the hash
  • Setting up a persistent connection with backdoors
  • Pivoting with meterpreter
  • Port forwarding with meterpreter
  • Meterpreter API and mixins
  • Railgun – converting ruby into a weapon
  • Adding DLL and function definitions to Railgun
  • Building a "Windows Firewall De-activator" meterpreter script
  • Analyzing an existing meterpreter script

Introduction

In the previous chapter, we learned about several powerful meterpreter commands which can be very helpful in post-exploitation. Meterpreter adds a lot of flexibility to the post-exploitation process by providing a very interactive and useful command interpreter. It not only eases the task, but also makes it more powerful and comprehensive. ...

Get Metasploit Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.