Meterpreter Modules

Upgrading Regular Shells

Regular shells can usually be upgraded to meterpreter shells by using the module post/multi/manage/shell_to_meterpreter


Extensions

Mimikatz (kiwi)

It's well known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory.

Powershell

Loads windows powershell in meterpreter


Modules

post/windows/gather/checkvm

This will determine if we're in a VM

post/multi/recon/local_exploit_suggester

This will check for various exploits which we can run within our session to elevate our privileges.

autoroute

used for pivoting, can add routing, it is a command in meterpreter shell like run autoroute -h

post/windows/gather/win_privs

This will list out users and their rights

Proxy Server

auxiliary/server/socks_proxy : to start a proxy server out of current session

Enumerate Applications

post/windows/gather/enum_applications : Enumerate the installed applications on the target machine

Firefox Credentials Gathering

post/multi/gather/firefox_creds : dumps the firefox stored credentials from the machine

exploit/windows/smb/psexec

The psexec module is often used by penetration testers to obtain access to a given system that you already know the credentials for.


Last updated