How to Upgrade Command Shell to Meterpreter

In network penetration testing, we always wish to hack a system of an internal network and try to make unauthorized access through a meterpreter session using the Metasploit framework.  But there are some exploits which provide directly victim’s command shell instead of meterpreter session. In this article, we have tried to upgrade from the victim’s shell to a meterpreter shell.

In the previous article, we had discussed related to how to access the victim’s shell. Now once you have access victims command shell then follow the given below step to upgrade a command shell into the meterpreter shell.

Here I have already access command shell of victim’s PC

In the following screenshot, you can perceive that it is showing the TYPE for session 1: shell.

This module attempts to upgrade a command shell to meterpreter. The shell platform is automatically detected and the best version of meterpreter for the target is selected. Currently, meterpreter/reverse_tcp is used on Windows and Linux, with python/meterpreter/reverse_tcp’ used on all others.

Let’s verify the TYPE for session 2

Now have a look over the last image which is showing the new session i.e. session 2 is a meterpreter session.

Author: Aarti Singh is a Researcher and Technical Writer at Hacking Articles an Information Security Consultant Social Media Lover and Gadgets. Contact here

Leave a Reply

Your email address will not be published. Required fields are marked *