All Rooms

Metasploit: Meterpreter

easy1h 30mtryhackme

Meterpreter is Metasploit's advanced post-exploitation payload. Unlike a basic shell, Meterpreter runs entirely in memory (no disk artifacts), encrypts all communications, and provides a rich command set for post-exploitation. This room covers Meterpreter's architecture, the different flavors available, core commands, and a hands-on challenge against a Windows box (ACME-TEST in the FLASH domain). You'll find the computer name, domain, a user's share, dump NTLM hashes, find cleartext credentials, locate hidden files, and read secrets. All answers come from the Windows target using Meterpreter commands and post-exploitation modules.

Skills You Will Learn

meterpreterpost-exploitationhashdumpfile-searchprivilege-escalation

Prerequisites

Walkthrough Phases

1

What Is Meterpreter

Understand Meterpreter architecture and why it's different from a basic shell

2

Meterpreter Flavors

Know which Meterpreter variant to use for each situation

3

Core Meterpreter Commands

Master the essential Meterpreter command set

4

Post-Exploitation Modules

Use formal post modules for systematic post-exploitation

5

Challenge: System Information

Identify the target computer name and domain

6

Challenge: User Shares

Find the share created by a user

7

Challenge: Dumping NTLM Hashes

Dump local account hashes and find jchambers

8

Challenge: Cleartext Password

Find jchambers cleartext password

9

Challenge: Finding secrets.txt

Locate secrets.txt and read its Twitter password

10

Challenge: Finding realsecret.txt

Locate realsecret.txt and read the real secret

13 questions to answer

alienrecon start thm-meterpreter

Don't have AlienRecon? Get started here