Meterpreter Functionality Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What command is used to upload files to the target in Meterpreter?

  • send
  • execute
  • download (correct)
  • copy

Which command in Meterpreter is used to find the name of the System user running Meterpreter?

  • showuser
  • getuid (correct)
  • sysuser
  • whoami

Where can Meterpreter scripts be found?

  • /scripts/meterpreter/
  • /usr/share/meterpreter/
  • /bin/scripts/
  • /usr/share/metasploit-framework/scripts/meterpreter (correct)

What command is used to run a Meterpreter script from a Meterpreter console?

<p>runscript (D)</p> Signup and view all the answers

Which of the following is NOT a Windows Command for Post-exploitation?

<p>cd (D)</p> Signup and view all the answers

What scenario involves moving from a compromised Target #1 to reach Target #2 without any tools?

<p>Routing Table Pivoting (D)</p> Signup and view all the answers

What method can be used to get a Meterpreter on T2 machine when inbound traffic from the attacker machine is blocked on port 445?

<p>Setting up a proxy server using routing table configuration (B)</p> Signup and view all the answers

In the context of the scenario, what does the firewall on machine T2 allow inbound traffic to port 445 from?

<p>Windows 7 (C)</p> Signup and view all the answers

Which tool would be used to have a Meterpreter shell on Windows 10 after scanning the machine from Kali and finding port 445 open?

<p>SMB Psexec module (A)</p> Signup and view all the answers

What action should be taken after opening a Meterpreter shell to Windows 7 using SMB Psexec module, according to the scenario?

<p>Add routing table configuration for Windows 10 (A)</p> Signup and view all the answers

Which method involves directly scanning Windows 10 using Nmap for port enumeration in the given scenario?

<p>Running auxiliary/scanner/portscan/tcp in Metasploit (D)</p> Signup and view all the answers

To establish a Meterpreter shell on T2, what is required before using the windows/meterpreter/bind_tcp payload?

<p>Adding routing table entry for T2 (A)</p> Signup and view all the answers

What is a common action in the post-exploitation phase?

<p>Looking at information gathering on the exploited systems (D)</p> Signup and view all the answers

Which command can be used in Windows to display the routing tables?

<p>Netstat –nr (A)</p> Signup and view all the answers

In port forwarding using the meterpreter shell, what does the command 'portfwd add -l 3333 -p 22 -r Ubuntu_IP_Address' do?

<p>Forwards traffic from port 22 on the local machine to port 3333 on the target Ubuntu machine (A)</p> Signup and view all the answers

Which tool can be used for relaying a meterpreter shell from Ubuntu to Windows 10?

<p>Netcat (A)</p> Signup and view all the answers

Which action is involved in SMB pivoting?

<p>Establishing a connection from Kali to Windows 10 through a netcat relay in Ubuntu (D)</p> Signup and view all the answers

In pivoting using routing tables, what does exploiting machine T1 on DMZ through an exploit refer to?

<p>Exploiting a machine located in a secure zone through a vulnerability (B)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Post-Exploitation Techniques
15 questions
Use Quizgecko on...
Browser
Browser