Meterpreter Functionality Quiz
18 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What command is used to upload files to the target in Meterpreter?

  • send
  • execute
  • download (correct)
  • copy

Which command in Meterpreter is used to find the name of the System user running Meterpreter?

  • showuser
  • getuid (correct)
  • sysuser
  • whoami

Where can Meterpreter scripts be found?

  • /scripts/meterpreter/
  • /usr/share/meterpreter/
  • /bin/scripts/
  • /usr/share/metasploit-framework/scripts/meterpreter (correct)

What command is used to run a Meterpreter script from a Meterpreter console?

<p>runscript (D)</p> Signup and view all the answers

Which of the following is NOT a Windows Command for Post-exploitation?

<p>cd (D)</p> Signup and view all the answers

What scenario involves moving from a compromised Target #1 to reach Target #2 without any tools?

<p>Routing Table Pivoting (D)</p> Signup and view all the answers

What method can be used to get a Meterpreter on T2 machine when inbound traffic from the attacker machine is blocked on port 445?

<p>Setting up a proxy server using routing table configuration (B)</p> Signup and view all the answers

In the context of the scenario, what does the firewall on machine T2 allow inbound traffic to port 445 from?

<p>Windows 7 (C)</p> Signup and view all the answers

Which tool would be used to have a Meterpreter shell on Windows 10 after scanning the machine from Kali and finding port 445 open?

<p>SMB Psexec module (A)</p> Signup and view all the answers

What action should be taken after opening a Meterpreter shell to Windows 7 using SMB Psexec module, according to the scenario?

<p>Add routing table configuration for Windows 10 (A)</p> Signup and view all the answers

Which method involves directly scanning Windows 10 using Nmap for port enumeration in the given scenario?

<p>Running auxiliary/scanner/portscan/tcp in Metasploit (D)</p> Signup and view all the answers

To establish a Meterpreter shell on T2, what is required before using the windows/meterpreter/bind_tcp payload?

<p>Adding routing table entry for T2 (A)</p> Signup and view all the answers

What is a common action in the post-exploitation phase?

<p>Looking at information gathering on the exploited systems (D)</p> Signup and view all the answers

Which command can be used in Windows to display the routing tables?

<p>Netstat –nr (A)</p> Signup and view all the answers

In port forwarding using the meterpreter shell, what does the command 'portfwd add -l 3333 -p 22 -r Ubuntu_IP_Address' do?

<p>Forwards traffic from port 22 on the local machine to port 3333 on the target Ubuntu machine (A)</p> Signup and view all the answers

Which tool can be used for relaying a meterpreter shell from Ubuntu to Windows 10?

<p>Netcat (A)</p> Signup and view all the answers

Which action is involved in SMB pivoting?

<p>Establishing a connection from Kali to Windows 10 through a netcat relay in Ubuntu (D)</p> Signup and view all the answers

In pivoting using routing tables, what does exploiting machine T1 on DMZ through an exploit refer to?

<p>Exploiting a machine located in a secure zone through a vulnerability (B)</p> Signup and view all the answers
Use Quizgecko on...
Browser
Browser