From the course: Penetration Testing with Metasploit

Unlock the full course today

Join today to access over 24,800 courses taught by industry experts.

Privilege escalation using Meterpreter

Privilege escalation using Meterpreter - Metasploit Tutorial

From the course: Penetration Testing with Metasploit

Privilege escalation using Meterpreter

- [Narrator] Now that we have seen what Meterpreter can do, let's have some fun with the exploited system. Let's start with sysinfo. As you can see, this is an Ubuntu 8.04 version running on 2.6 version of the Linux kernel, x86 architecture, et cetera. Then we can run getuid, which is user ID. We can get get-environment, which is the environment variables. No environment variables were found. We can run netstat to identify which network interfaces and what connections are essentially run from that particular system. There are quite a few, but if you notice, there is one from the target system, from the exploited system to our Kali Linux machine, which is currently established. Again, the same system, port 22 to our attacker system, which is the Kali Linux machine that you see. What are the other commands I can use? Let me just take a list of that. There are certain commands related to webcam, mic, audio. I'll not be…

Contents