Meterpreter shell
by - Thursday, January 1, 1970 at 12:00 AM
Hi everyone,

I hope this is the place to post a question about it. I couldn't find a better category but would be happy to delete and repost.

While discussing with a hacker friend about Meterpreter, we disagreed if the original Meterpreter code is still a concern nowadays-Familiar malicious code, and most services have technological control (AV) that would block the file from reaching the target or even being uploaded to the server.

I have to check if it's true or not.
The original Meterpreter code using msfvenom can be disguised as a Trojan or steganography but shouldn't be encoded.

How to get a Meterpreter shell on the target?
  1. Email
  2. Driveby download
  3. Link
  4. Gaining initial shell and upgrade


It can be hidden using
  • Metadata
  • binwalk
  • Macro


Please help out.
Are there any other ways I should test? I would be very happy to cover as many possible options.
If you can provide a tool with your recommendation, that will make me even more grateful.

Best day yo!
Reply


 Users viewing this thread: Meterpreter shell: No users currently viewing.