Advertisement

088 part of Ethical Hacking - Meterpreter environment

088 part of Ethical Hacking - Meterpreter environment Do you want to learn a new profession in the field of security and earn money from it legally?
So you want to be a web security researcher? -
.......................................................................................................................................................
At the end of this course, the following 5 tips with detailed examples will be discussed in detail:
- Why is ethical hacking a valuable skill in today's world.
- What are the best ethical certificates for hackers.
- Tips for getting your first legally job as an ethical hacker.
- How I started my career as an ethical hacker and earning money from it.
- How to price your work.
________________________________________________________________________________________

Hello everyone and welcome to this online ethical hacking 88 part course.

I hope you will enjoy this course.

MAIN TABLE OF CONTENTS -

Here we’re listing out some useful commands of meterpreter as follows:

Background the current session – background
Kill a background meterpreter session – bgkill
Displays info about active channels – channel
Close a channel – close
Disables encoding of unicode strings – disable_unicode_encoding
Enable encoding of unicode strings – enable_unicode_encoding
Exit meterpreter shell – exit
Display info about active post module – info
Interact with a channel – interact
Drop into irb scripting mode – irb
Load one or more meterpreter extensions – load
Migrate the server to another – migrate
Terminate the meterpreter sessions – quit
Reads data from a channel – read
Run the commands stored in a file – resource
Executes a meterpreter script or post module – run
Write data to a channel – write
Read the contents of a file to the screen – cat
Change directory – cd
Download file to your system – download
Edit a file – edit
Print local working directory – getlwd
Print working directory – getwd
Change local working directory – lcd
Print local working directory – lpwd
List files – ls
Make directory – mkdir
Print working directory – pwd
Delete the speficied file – rm
Remove directory – rmdir
Search for files – search
Upload file to target – upload
Get the current meterpreter desktop – getdesktop
Display the amoung of time the user has been idle – idletime
Start capturing keystrokes – keyscan_start
Stop capturing keystrokes – keyscan_stop
Dump the keystroke buffer – keyscan_dump
Screenshot of the GUI – screenshot
Change the meterpreters current desktop – setdesktop
Control some of the user interface components – uictl
List webcams – webcam_list
Take a snapshot from the specified webcam – webcam_snap
Attempt to elevate your priviledge to that of local system – getsystem
Dumps the contents of the SAM database – hashdump
Manipulate MACE attributes – timestop
Clear the event log – clearev
Relinquishes any active impersonation token – drop_token
Execute a command – execute
Get the current process identifier – getpid
Attempt to enable all privileges available to the current process – getprivs
Get the user that the server is running as – getuid
Terminate a process – kill
List running processes – ps
Reboots the remote computer – reboot
Interact with remote registry – reg
Calls RevertToSelf() on the remote machine – rev2self
Drop into a system command shell – shell
Shuts down the remote computer – shutdown
Attempt to steal an Impersonation token from the process – steal_token
Gets information about the remote system – sysinfo


.............................................................................................................................................
Please support the channel financially to buy new courses for You.
Register Payeer here: and send any currency You like for my account: P1018424709
Thank you for your support and views!
________________
DISCLAIMER
All the contents provided by our channel is only for educational purpose. The Broken Security is not responsible for damages of any kind arising due to wrong usage.
Thanks for watching.

EthicalHacking2019,ethical hacking,hacking course,ethical hacking course,best hacking course for beginners,ethical hacking course for beginners,learn hacking for beginners free,hacking for beginners 2019,kali,pentest,metasploit,mac address,google hacking,hydra,exploit,cracking,wireless attack,airodump,aircrack,ethical hacking for beginners,learn hacking,hacking 101,complete course,Meterpreter environment,meterpreter,

Post a Comment

0 Comments