Podcast
Questions and Answers
What command is used to upload files to the target in Meterpreter?
What command is used to upload files to the target in Meterpreter?
Which command in Meterpreter is used to find the name of the System user running Meterpreter?
Which command in Meterpreter is used to find the name of the System user running Meterpreter?
Where can Meterpreter scripts be found?
Where can Meterpreter scripts be found?
What command is used to run a Meterpreter script from a Meterpreter console?
What command is used to run a Meterpreter script from a Meterpreter console?
Signup and view all the answers
Which of the following is NOT a Windows Command for Post-exploitation?
Which of the following is NOT a Windows Command for Post-exploitation?
Signup and view all the answers
What scenario involves moving from a compromised Target #1 to reach Target #2 without any tools?
What scenario involves moving from a compromised Target #1 to reach Target #2 without any tools?
Signup and view all the answers
What method can be used to get a Meterpreter on T2 machine when inbound traffic from the attacker machine is blocked on port 445?
What method can be used to get a Meterpreter on T2 machine when inbound traffic from the attacker machine is blocked on port 445?
Signup and view all the answers
In the context of the scenario, what does the firewall on machine T2 allow inbound traffic to port 445 from?
In the context of the scenario, what does the firewall on machine T2 allow inbound traffic to port 445 from?
Signup and view all the answers
Which tool would be used to have a Meterpreter shell on Windows 10 after scanning the machine from Kali and finding port 445 open?
Which tool would be used to have a Meterpreter shell on Windows 10 after scanning the machine from Kali and finding port 445 open?
Signup and view all the answers
What action should be taken after opening a Meterpreter shell to Windows 7 using SMB Psexec module, according to the scenario?
What action should be taken after opening a Meterpreter shell to Windows 7 using SMB Psexec module, according to the scenario?
Signup and view all the answers
Which method involves directly scanning Windows 10 using Nmap for port enumeration in the given scenario?
Which method involves directly scanning Windows 10 using Nmap for port enumeration in the given scenario?
Signup and view all the answers
To establish a Meterpreter shell on T2, what is required before using the windows/meterpreter/bind_tcp payload?
To establish a Meterpreter shell on T2, what is required before using the windows/meterpreter/bind_tcp payload?
Signup and view all the answers
What is a common action in the post-exploitation phase?
What is a common action in the post-exploitation phase?
Signup and view all the answers
Which command can be used in Windows to display the routing tables?
Which command can be used in Windows to display the routing tables?
Signup and view all the answers
In port forwarding using the meterpreter shell, what does the command 'portfwd add -l 3333 -p 22 -r Ubuntu_IP_Address' do?
In port forwarding using the meterpreter shell, what does the command 'portfwd add -l 3333 -p 22 -r Ubuntu_IP_Address' do?
Signup and view all the answers
Which tool can be used for relaying a meterpreter shell from Ubuntu to Windows 10?
Which tool can be used for relaying a meterpreter shell from Ubuntu to Windows 10?
Signup and view all the answers
Which action is involved in SMB pivoting?
Which action is involved in SMB pivoting?
Signup and view all the answers
In pivoting using routing tables, what does exploiting machine T1 on DMZ through an exploit refer to?
In pivoting using routing tables, what does exploiting machine T1 on DMZ through an exploit refer to?
Signup and view all the answers