Meterpreter is an advanced payload that uses in-memory DLL injection stagers. By default, meterpreter uses encrypted communications and since it's injected into a currently running process, it creates no new process, which creates limited forensic evidence on the target system. In this recipe, we will learn about uploading a meterpreter payload on the target system using sqlmap.
Backdoors using meterpreter
How to do it...
Let's perform the following steps:
- We first check whether the user is DBA by running sqlmap with the -is-dba flag, as shown in the following screenshot:
![](https://static.packt-cdn.com/products/9781789952308/graphics/assets/dc11a8d5-6472-4bd9-a337-e7532cfd3df4.png)
- Then, we use -os-shell, which prompts us a shell. We run the command to check whether we have the required privileges:
whoami
The following...