0% found this document useful (0 votes)
39 views6 pages

Metasploit - The Ultimate Command Cheat Sheet

The document provides a comprehensive cheat sheet for Metasploit's Meterpreter commands, detailing core, file system, networking, system, user interface, privilege escalation, password dump, and timestomp commands. It emphasizes the power of Meterpreter for hacking and offers tips for using the commands effectively. Additionally, it promotes ethical hacking training and other related resources available for purchase.

Uploaded by

faggotkilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views6 pages

Metasploit - The Ultimate Command Cheat Sheet

The document provides a comprehensive cheat sheet for Metasploit's Meterpreter commands, detailing core, file system, networking, system, user interface, privilege escalation, password dump, and timestomp commands. It emphasizes the power of Meterpreter for hacking and offers tips for using the commands effectively. Additionally, it promotes ethical hacking training and other related resources available for purchase.

Uploaded by

faggotkilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CYBER WEAPONS LAB #$ FOLLOW US & %

NULL BYTE
CYBER WEAPONS LAB

H AC K L I K E A P R O

The Ultimate
Command Cheat
Sheet for
Metasploit's
Meterpreter
BY OCCUPYTHEWEB ! 10/29/2013 1:35 PM " 01/18/2019 4:49 PM
METASPLOIT BASICS

I' ve done numerous tutorials in Null Byte


demonstrating the power of Metasploit's meterpreter.
With the meterpreter on the target system, you have
nearly total command of the victim.
:
As a result, several of you have asked me for a
complete list of commands available for the
meterpreter because there doesn't seem to be a
complete list anywhere on the web. So here it goes.
Hack a system and have fun testing out these
commands.

Step 1 Core Commands


At its most basic use, meterpreter is a Linux terminal
on the victim's computer. As such, many of our basic
Linux commands can be used on the meterpreter even
if it's on a Windows or other operating system. Here
are some of the core commands we can use on the
meterpreter:

? help menu
background moves the current session to the background
bgkill kills a background meterpreter script
bglist provides a list of all running background scripts
bgrun runs a script as a background thread
channel displays active channels
close closes a channel
exit terminates a meterpreter session
exploit executes the meterpreter script designated after it
help help menu
interact interacts with a channel
irb go into Ruby scripting mode
migrate moves the active process to a designated PID
quit terminates the meterpreter session
read reads the data from a channel
run executes the meterpreter script designated after it
use loads a meterpreter extension
write writes data to a channel

Step 2 File System Commands

cat read and output to stdout the contents of a file


cd change directory on the victim
del delete a file on the victim
download download a file from the victim system to the attacker system
edit edit a file with vim
getlwd print the local directory
getwd print working directory
:
lcd change local directory
lpwd print local directory
ls list files in current directory
mkdir make a directory on the victim system
pwd print working directory
rm delete (remove) a file
rmdir remove directory on the victim system
upload upload a file from the attacker system to the victim

Step 3 Networking Commands

ipconfig displays network interfaces with key information including IP address, et


portfwd forwards a port on the victim system to a remote service
route view or modify the victim routing table

Step 4 System Commands

clearev clears the event logs on the victim's computer


drop_token drops a stolen token
execute executes a command
getpid gets the current process ID (PID)
getprivs gets as many privileges as possible
getuid get the user that the server is running as
kill terminate the process designated by the PID
ps list running processes
reboot reboots the victim computer
reg interact with the victim's registry
rev2self calls RevertToSelf() on the victim machine
shell opens a command shell on the victim machine
shutdown shuts down the victim's computer
steal_token attempts to steal the token of a specified (PID) process
sysinfo gets the details about the victim computer such as OS and name

Step 5 User Interface Commands

enumdesktops lists all accessible desktops


getdesktop get the current meterpreter desktop
idletime checks to see how long since the victim system has been idle
keyscan_dump dumps the contents of the software keylogger
keyscan_start starts the software keylogger when associated with a process such as Word
keyscan_stop stops the software keylogger
screenshot grabs a screenshot of the meterpreter desktop
set_desktop changes the meterpreter desktop
uictl enables control of some of the user interface components
:
Step 6 Privilege Escalation
Commands

getsystem uses 15 built-in methods to gain sysadmin privileges

Step 7 Password Dump Commands

hashdump grabs the hashes in the password (SAM) file

Note that hashdump will often trip AV software, but


there are now two scripts that are more stealthy, run
hashdump and run smart_hashdump
smart_hashdump. Look for
more on those in my meterpreter script cheat sheet.

Step 8 Timestomp Commands

timestomp manipulates the modify, access, and create attributes of a file

Stay Tuned for More Meterpreter Tips


I've already used many of these commands in
previous tutorials, and I will be using more in future
guides as well to show you how they work. Also,
bookmark this page as it is possibly the most
complete cheat sheet of meterpreter commands found
anywhere on the web, so you'll want it to refer back
to this sheet often.

Finally, check out my second meterpreter cheat sheet


with the 135 scripts available for the meterpreter to
continue hacking with metasploit.

Want to start making money as a white hat


hacker? Jump-start your hacking career with our 2020
:
Premium Ethical Hacking Certification Training Bundle
from the new Null Byte Shop and get over 60 hours of
training from cybersecurity professionals.

Buy Now (90% off ) >

Other worthwhile deals to check out:

97% off The Ultimate 2021 White Hat Hacker


Certification Bundle
99% off The 2021 All-in-One Data Scientist Mega
Bundle
98% off The 2021 Premium Learn To Code
Certification Bundle
62% off MindMaster Mind Mapping Software:
Perpetual License

Cover photo by Justin Meyers/Null Byte

Our Best Hacking &


Security Guides
New Null Byte posts — delivered straight to
your inbox.

Your Email

' SUBSCRIBE NOW

WonderHowTo.com About Us Terms of Use Privacy Policy

'

SUBSCRIBE NOW
:
Don't Miss:
What's New in iOS 14? The 200+ Best, Hidden & Most Powerful Features & Changes for iPhone
22 Things You Need to Know About iOS 14's Newly Redesigned Widgets for iPhone
Best New iOS 14 Home Screen Widgets & The Apps You Need
13 Exciting New Features in Apple Photos for iOS 14
9 Ways iOS 14 Improves Siri on Your iPhone
16 New Apple Maps Features for iPhone in iOS 14
19 Hidden New Features in iOS 14's Accessibility Menu
Every New Feature iOS 14 Brings to the Home App on Your iPhone

By using this site you acknowledge and agree to our terms of use & privacy policy.
We do not sell personal information to 3rd parties.
:

You might also like