Post Exploitation with Meterpreter

In a penetration test, escalating your privileges and exfiltrating data are some of the most important tasks of the assessment. This course will teach you how to use the Meterpreter tool for post-exploitation tasks.
Course info
Level
Intermediate
Updated
Mar 26, 2021
Duration
1h 41m
Table of contents
Description
Course info
Level
Intermediate
Updated
Mar 26, 2021
Duration
1h 41m
Description

During a penetration test engagement your job is to exploit the target systems, escalate privileges, create persistence, and exfiltrate data. In this course, Post Exploitation with Meterpreter, you’ll learn to perform all post-exploitation tasks with the Meterpreter tool, which is part of the Metasploit Framework. First, you’ll explore how to initiate a Meterpreter session and the basic Meterpreter shell commands. Next, you’ll discover how to escalate your privileges to gain admin-level access. Then, you’ll learn how to create persistence in the target system. Finally, you will learn how to use the Meterpreter tool to search and exfiltrate sensitive data. When you’re finished with this course, you’ll have the skills and knowledge of post exploitation with Meterpreter needed to perform a complete penetration test.

About the author
About the author

Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.

More from the author
Persistence with Impacket
Intermediate
20m
Sep 15, 2021
Planning and Scoping for CompTIA Pentest+
Intermediate
1h 46m
Jul 7, 2021
More courses by Ricardo Reimao
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Ricardo, and welcome to my course, Post Exploitation with Meterpreter. I'm a cyber security specialist with years of experience in offensive security and instant detection. During a penetration test engagement, after getting initial access to your victim computer, you have to perform several post exploitation tasks such as privilege escalation, creating persistence, and even sometimes data exfiltration. In this course, you'll learn how to perform all those post exploitation tasks with the meterpreter tool, which is part of the Metasploit Framework. In this course, we cover some really important topics, such as how to get a meterpreter session to your victim computer, how to escalate privileges using vulnerabilities and misconfigurations, how to create persistence using scheduled tasks and services, and how to search and exfiltrate data without being detected. By the end of this course, you'll be fluent in meterpreter, and you'll be able to perform all the post exploitation tasks using that tool. So I hope you'll join me in this journey to learn about exploitation techniques with the Post Exploitation with Meterpreter course, here, at Pluralsight.