Post exploitation using Meterpreter
In this section, you will learn to leverage the power of Meterpreter to help automate many post-exploitation actions on a compromised host. Meterpreter is a Metasploit component that allows a penetration tester to interact with a reverse shell between the victim/compromised machine and the attacker machine. Metasplot does all the heavy lifting and even helps the attacker manage multiple sessions.
To put it simply, Meterpreter is a process that runs on the memory of the compromised system and does not write any data on the compromised system’s disk, therefore reducing the risk of detection and attribution. Penetration testers will be able to execute various actions on their Meterpreter console, which are then remotely executed on the compromised target machine.
Let’s quickly recap. In Chapter 2, Building a Penetration Testing Lab, you assembled and built your very own penetration testing lab environment with various internal...