18 Questions
What command is used to upload files to the target in Meterpreter?
download
Which command in Meterpreter is used to find the name of the System user running Meterpreter?
getuid
Where can Meterpreter scripts be found?
/usr/share/metasploit-framework/scripts/meterpreter
What command is used to run a Meterpreter script from a Meterpreter console?
runscript
Which of the following is NOT a Windows Command for Post-exploitation?
cd
What scenario involves moving from a compromised Target #1 to reach Target #2 without any tools?
Routing Table Pivoting
What method can be used to get a Meterpreter on T2 machine when inbound traffic from the attacker machine is blocked on port 445?
Setting up a proxy server using routing table configuration
In the context of the scenario, what does the firewall on machine T2 allow inbound traffic to port 445 from?
Windows 7
Which tool would be used to have a Meterpreter shell on Windows 10 after scanning the machine from Kali and finding port 445 open?
SMB Psexec module
What action should be taken after opening a Meterpreter shell to Windows 7 using SMB Psexec module, according to the scenario?
Add routing table configuration for Windows 10
Which method involves directly scanning Windows 10 using Nmap for port enumeration in the given scenario?
Running auxiliary/scanner/portscan/tcp in Metasploit
To establish a Meterpreter shell on T2, what is required before using the windows/meterpreter/bind_tcp payload?
Adding routing table entry for T2
What is a common action in the post-exploitation phase?
Looking at information gathering on the exploited systems
Which command can be used in Windows to display the routing tables?
Netstat –nr
In port forwarding using the meterpreter shell, what does the command 'portfwd add -l 3333 -p 22 -r Ubuntu_IP_Address' do?
Forwards traffic from port 22 on the local machine to port 3333 on the target Ubuntu machine
Which tool can be used for relaying a meterpreter shell from Ubuntu to Windows 10?
Netcat
Which action is involved in SMB pivoting?
Establishing a connection from Kali to Windows 10 through a netcat relay in Ubuntu
In pivoting using routing tables, what does exploiting machine T1 on DMZ through an exploit refer to?
Exploiting a machine located in a secure zone through a vulnerability
Test your knowledge on Meterpreter's functionality by answering questions related to commands like 'upload' and 'getuid'. Explore how to upload files to a target and retrieve information about the System user running Meterpreter.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free