From the course: Penetration Testing with Metasploit
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Privilege escalation using Meterpreter - Metasploit Tutorial
From the course: Penetration Testing with Metasploit
Privilege escalation using Meterpreter
- [Narrator] Now that we have seen what Meterpreter can do, let's have some fun with the exploited system. Let's start with sysinfo. As you can see, this is an Ubuntu 8.04 version running on 2.6 version of the Linux kernel, x86 architecture, et cetera. Then we can run getuid, which is user ID. We can get get-environment, which is the environment variables. No environment variables were found. We can run netstat to identify which network interfaces and what connections are essentially run from that particular system. There are quite a few, but if you notice, there is one from the target system, from the exploited system to our Kali Linux machine, which is currently established. Again, the same system, port 22 to our attacker system, which is the Kali Linux machine that you see. What are the other commands I can use? Let me just take a list of that. There are certain commands related to webcam, mic, audio. I'll not be…