In previous
article we have seen how to upgrade a command shell into meterpreter using Post
exploitation in metasploit. Again we are going to perform same task using a
different technique.
LETS BEGIN!!!
msf auxiliary(telnet_login) >sessions
In following screenshot you can perceive that it is showing the TYPE for
session 1: shell.
Once you got the reverse connection of remote system and
access its command shell through metasploit now you can manipulate your active
sessions. You just need to type sessions –h as command inside
metasploit, this help command will
display the multiple option which can be utilized with active session.
msf auxiliary(telnet_login)
>sessions –h
So in the following screenshot you can perceive
that the highlighted option is used to upgrade a command shell into meterpreter
session.
Since
we have command shell so here we can
use “-u” (option) with session ID
for upgrading our shell into meterpreter
session. Execute following command for session manipulation.
msf
auxiliary(telnet_login) >sessions –u 1
When
you will execute above command you will get meterpreter session as session 2.
Now enjoy your meterpreter session and execute its command.
msf
auxiliary(telnet_login) >sessions
0 comments:
Post a Comment