🆘MSF Sessions
Sessions & Jobs
Sessions
creates dedicated control interfaces for all of your deployed modules. once a session is placed in the background, it will continue to run, and our connection to the target host will persist.
we can background the session as long as they form a channel of communication with the target host with CRTL+Z
We can use the sessions
command to view our currently active sessions.
And we can interract with sessions with the sessions -i [no.]
command
If, for example, we are running an active exploit under a specific port and need this port for a different module, we'll use jobs
command to look at the currently active tasks running in the background and terminate the old ones to free up the port.
When we run an exploit, we can run it as a job by typing exploit -j
Running an Exploit as a Background Job
If we want to list running jobs ->
Meterpreter
The Meterpreter
Payload is a specific type of multi-faceted, extensible Payload that uses DLL injection
to ensure the connection to the victim host is stable and difficult to detect using simple checks and can be configured to be persistent across reboots or system changes.
Once we got our meterpreter shell with admin rights we can dump hashes with the following command
Retrieve the NTLM password hash for the "htb-student" user. Submit the hash as the answer.
Last updated