Let's start by using Meterpreter commands to understand their functionality. As it is a post-exploitation tool, we will require a compromised target to execute the commands. We will be using the Metasploitable 3 machine as a target that we have exploited using the Microsoft Windows Authenticated User Code Execution exploit module.
To avoid setting up the Microsoft Windows Authenticated User Code Execution exploit module every single time we want to test Meterpreter commands, we will use one of my favorite Metasploit Framework features, resource scripts. Resource scripts provide an easy way for us to automate repetitive tasks in Metasploit.
- The Metasploit Framework comes packed with several resource scripts that have been contributed to by the community, which you can find at
/usr/share/metasploit-framework/scripts/resource/
in your Kali Linux machine:
root@kali:~# ls /usr/share/metasploit-framework/scripts/resource/ auto_brute...