CYBER WEAPONS LAB                                           #$   FOLLOW US   & %
NULL BYTE
               CYBER WEAPONS LAB
            H AC K L I K E A P R O
         The Ultimate
         Command Cheat
         Sheet for
         Metasploit's
         Meterpreter
         BY OCCUPYTHEWEB     ! 10/29/2013 1:35 PM   " 01/18/2019 4:49 PM
         METASPLOIT BASICS
    I' ve done numerous tutorials in Null Byte
    demonstrating the power of Metasploit's meterpreter.
    With the meterpreter on the target system, you have
    nearly total command of the victim.
:
    As a result, several of you have asked me for a
    complete list of commands available for the
    meterpreter because there doesn't seem to be a
    complete list anywhere on the web. So here it goes.
    Hack a system and have fun testing out these
    commands.
    Step 1       Core Commands
    At its most basic use, meterpreter is a Linux terminal
    on the victim's computer. As such, many of our basic
    Linux commands can be used on the meterpreter even
    if it's on a Windows or other operating system. Here
    are some of the core commands we can use on the
    meterpreter:
      ?                  help menu
      background         moves the current session to the background
      bgkill             kills a background meterpreter script
      bglist             provides a list of all running background scripts
      bgrun              runs a script as a background thread
      channel            displays active channels
      close              closes a channel
      exit               terminates a meterpreter session
      exploit            executes the meterpreter script designated after it
      help               help menu
      interact           interacts with a channel
      irb                go into Ruby scripting mode
      migrate            moves the active process to a designated PID
      quit               terminates the meterpreter session
      read               reads the data from a channel
      run                executes the meterpreter script designated after it
      use                loads a meterpreter extension
      write              writes data to a channel
    Step 2       File System Commands
      cat                read and output to stdout the contents of a file
      cd                 change directory on the victim
      del                delete a file on the victim
      download           download a file from the victim system to the attacker system
      edit               edit a file with vim
      getlwd             print the local directory
      getwd              print working directory
:
      lcd              change local directory
      lpwd             print local directory
      ls               list files in current directory
      mkdir            make a directory on the victim system
      pwd              print working directory
      rm               delete (remove) a file
      rmdir            remove directory on the victim system
      upload           upload a file from the attacker system to the victim
    Step 3       Networking Commands
      ipconfig         displays network interfaces with key information including IP address, et
      portfwd          forwards a port on the victim system to a remote service
      route            view or modify the victim routing table
    Step 4       System Commands
      clearev          clears the event logs on the victim's computer
      drop_token       drops a stolen token
      execute          executes a command
      getpid           gets the current process ID (PID)
      getprivs         gets as many privileges as possible
      getuid           get the user that the server is running as
      kill             terminate the process designated by the PID
      ps               list running processes
      reboot           reboots the victim computer
      reg              interact with the victim's registry
      rev2self         calls RevertToSelf() on the victim machine
      shell            opens a command shell on the victim machine
      shutdown         shuts down the victim's computer
      steal_token      attempts to steal the token of a specified (PID) process
      sysinfo          gets the details about the victim computer such as OS and name
    Step 5       User Interface Commands
      enumdesktops     lists all accessible desktops
      getdesktop       get the current meterpreter desktop
      idletime         checks to see how long since the victim system has been idle
      keyscan_dump     dumps the contents of the software keylogger
      keyscan_start    starts the software keylogger when associated with a process such as Word
      keyscan_stop     stops the software keylogger
      screenshot       grabs a screenshot of the meterpreter desktop
      set_desktop      changes the meterpreter desktop
      uictl            enables control of some of the user interface components
:
    Step 6 Privilege Escalation
    Commands
      getsystem          uses 15 built-in methods to gain sysadmin privileges
    Step 7       Password Dump Commands
      hashdump           grabs the hashes in the password (SAM) file
    Note that hashdump will often trip AV software, but
    there are now two scripts that are more stealthy, run
    hashdump and run smart_hashdump
                           smart_hashdump. Look for
    more on those in my meterpreter script cheat sheet.
    Step 8       Timestomp Commands
      timestomp          manipulates the modify, access, and create attributes of a file
    Stay Tuned for More Meterpreter Tips
    I've already used many of these commands in
    previous tutorials, and I will be using more in future
    guides as well to show you how they work. Also,
    bookmark this page as it is possibly the most
    complete cheat sheet of meterpreter commands found
    anywhere on the web, so you'll want it to refer back
    to this sheet often.
    Finally, check out my second meterpreter cheat sheet
    with the 135 scripts available for the meterpreter to
    continue hacking with metasploit.
    Want to start making money as a white hat
    hacker? Jump-start your hacking career with our 2020
:
    Premium Ethical Hacking Certification Training Bundle
    from the new Null Byte Shop and get over 60 hours of
    training from cybersecurity professionals.
    Buy Now (90% off ) >
    Other worthwhile deals to check out:
         97% off The Ultimate 2021 White Hat Hacker
         Certification Bundle
         99% off The 2021 All-in-One Data Scientist Mega
         Bundle
         98% off The 2021 Premium Learn To Code
         Certification Bundle
         62% off MindMaster Mind Mapping Software:
         Perpetual License
    Cover photo by Justin Meyers/Null Byte
              Our Best Hacking &
               Security Guides
           New Null Byte posts — delivered straight to
                          your inbox.
           Your Email
                         ' SUBSCRIBE NOW
                         WonderHowTo.com     About Us    Terms of Use   Privacy Policy
                         '
                             SUBSCRIBE NOW
:
                                            Don't Miss:
    What's New in iOS 14? The 200+ Best, Hidden & Most Powerful Features & Changes for iPhone
         22 Things You Need to Know About iOS 14's Newly Redesigned Widgets for iPhone
                   Best New iOS 14 Home Screen Widgets & The Apps You Need
                        13 Exciting New Features in Apple Photos for iOS 14
                            9 Ways iOS 14 Improves Siri on Your iPhone
                         16 New Apple Maps Features for iPhone in iOS 14
                      19 Hidden New Features in iOS 14's Accessibility Menu
                 Every New Feature iOS 14 Brings to the Home App on Your iPhone
         By using this site you acknowledge and agree to our terms of use & privacy policy.
                          We do not sell personal information to 3rd parties.
: