Metasploit: Meterpreter
Meterpreter is Metasploit's advanced post-exploitation payload. Unlike a basic shell, Meterpreter runs entirely in memory (no disk artifacts), encrypts all communications, and provides a rich command set for post-exploitation. This room covers Meterpreter's architecture, the different flavors available, core commands, and a hands-on challenge against a Windows box (ACME-TEST in the FLASH domain). You'll find the computer name, domain, a user's share, dump NTLM hashes, find cleartext credentials, locate hidden files, and read secrets. All answers come from the Windows target using Meterpreter commands and post-exploitation modules.
Skills You Will Learn
Prerequisites
- thm-metasploitintro
- thm-metasploitexploitation
- metasploit
- msfconsole
- exploitation
Walkthrough Phases
What Is Meterpreter
Understand Meterpreter architecture and why it's different from a basic shell
Meterpreter Flavors
Know which Meterpreter variant to use for each situation
Core Meterpreter Commands
Master the essential Meterpreter command set
Post-Exploitation Modules
Use formal post modules for systematic post-exploitation
Challenge: System Information
Identify the target computer name and domain
Challenge: User Shares
Find the share created by a user
Challenge: Dumping NTLM Hashes
Dump local account hashes and find jchambers
Challenge: Cleartext Password
Find jchambers cleartext password
Challenge: Finding secrets.txt
Locate secrets.txt and read its Twitter password
Challenge: Finding realsecret.txt
Locate realsecret.txt and read the real secret