Podcast
Questions and Answers
What command is used to upload files to the target in Meterpreter?
What command is used to upload files to the target in Meterpreter?
- send
- execute
- download (correct)
- copy
Which command in Meterpreter is used to find the name of the System user running Meterpreter?
Which command in Meterpreter is used to find the name of the System user running Meterpreter?
- showuser
- getuid (correct)
- sysuser
- whoami
Where can Meterpreter scripts be found?
Where can Meterpreter scripts be found?
- /scripts/meterpreter/
- /usr/share/meterpreter/
- /bin/scripts/
- /usr/share/metasploit-framework/scripts/meterpreter (correct)
What command is used to run a Meterpreter script from a Meterpreter console?
What command is used to run a Meterpreter script from a Meterpreter console?
Which of the following is NOT a Windows Command for Post-exploitation?
Which of the following is NOT a Windows Command for Post-exploitation?
What scenario involves moving from a compromised Target #1 to reach Target #2 without any tools?
What scenario involves moving from a compromised Target #1 to reach Target #2 without any tools?
What method can be used to get a Meterpreter on T2 machine when inbound traffic from the attacker machine is blocked on port 445?
What method can be used to get a Meterpreter on T2 machine when inbound traffic from the attacker machine is blocked on port 445?
In the context of the scenario, what does the firewall on machine T2 allow inbound traffic to port 445 from?
In the context of the scenario, what does the firewall on machine T2 allow inbound traffic to port 445 from?
Which tool would be used to have a Meterpreter shell on Windows 10 after scanning the machine from Kali and finding port 445 open?
Which tool would be used to have a Meterpreter shell on Windows 10 after scanning the machine from Kali and finding port 445 open?
What action should be taken after opening a Meterpreter shell to Windows 7 using SMB Psexec module, according to the scenario?
What action should be taken after opening a Meterpreter shell to Windows 7 using SMB Psexec module, according to the scenario?
Which method involves directly scanning Windows 10 using Nmap for port enumeration in the given scenario?
Which method involves directly scanning Windows 10 using Nmap for port enumeration in the given scenario?
To establish a Meterpreter shell on T2, what is required before using the windows/meterpreter/bind_tcp payload?
To establish a Meterpreter shell on T2, what is required before using the windows/meterpreter/bind_tcp payload?
What is a common action in the post-exploitation phase?
What is a common action in the post-exploitation phase?
Which command can be used in Windows to display the routing tables?
Which command can be used in Windows to display the routing tables?
In port forwarding using the meterpreter shell, what does the command 'portfwd add -l 3333 -p 22 -r Ubuntu_IP_Address' do?
In port forwarding using the meterpreter shell, what does the command 'portfwd add -l 3333 -p 22 -r Ubuntu_IP_Address' do?
Which tool can be used for relaying a meterpreter shell from Ubuntu to Windows 10?
Which tool can be used for relaying a meterpreter shell from Ubuntu to Windows 10?
Which action is involved in SMB pivoting?
Which action is involved in SMB pivoting?
In pivoting using routing tables, what does exploiting machine T1 on DMZ through an exploit refer to?
In pivoting using routing tables, what does exploiting machine T1 on DMZ through an exploit refer to?