From the course: Penetration Testing with Metasploit

Unlock the full course today

Join today to access over 24,800 courses taught by industry experts.

Meterpreter commands

Meterpreter commands

- [Instructor] In this video, we will explore how Meterpreter works, how we can take a Meterpreter session and explore the various commands and features offered by Meterpreter. Here I am in my Metasploit console. I've already loaded an auxiliary scanner for SSH brute force. This is the same as the one that I used when we did the Metasploitable exploitation for SSH enumeration. So let me just quickly check the options. All the options are set. You may note that instead of using a word list, now that I know the correct password, I've already configured the username and password, along with the IP address of my Metasploitable to virtual machine. All the options are set. Let me exploit. Now that we have successfully exploited the system, you can see that the auxiliary module has created a command shell, which would essentially be a simple Unix shell between my system, the Kali Linux attacker machine, and the victim…

Contents