-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Metasploit Penetration Testing Cookbook
By :
Let us start using meterpreter commands to understand their functionality. As it is a post exploitation tool, we will require a compromised target to execute the commands. We will be using a Windows 7 machine as a target that we have exploited using browser vulnerability. You can refer to the Internet Explorer CSS recursive call memory corruption recipe in Chapter 4, Client-side Exploitation and Antivirus Bypass, for further details.
After compromising the Windows 7 target machine, we will have a meterpreter session started as we have used the windows/meterpreter/bind_tcp payload. We will start off by using a simple ? command that will list all the available meterpreter commands, along with a short description:
meterpreter > ?
Take a quick look at the entire list. Many of the commands are self-explanatory.
Let us start with some useful system commands.
background: This command is used to set the current session as background...
Change the font size
Change margin width
Change background colour