Metasploit
Resources
Getsystem Explaination: https://blog.cobaltstrike.com/2014/04/02/what-happens-when-i-type-getsystem/
/etc/init.d/postgresql start
Payload Types
Unstaged
windows/shell_reverse_tcp:
The entire shell is in this code, and I can catch the callback withnc
.
Staged
windws/shell/reverse_tcp:
I’d need to use Metasploitsexploit/multi/handler
to get the callback.
RDP Access from Meterpreter Shell
Useful Commands
Windows Post-Exploitation
Last updated