Talk With an Expert

An Analysis of Meterpreter during Post-Exploitation

An Analysis of Meterpreter during Post-Exploitation (PDF, 12.63MB)Published: 10 Oct, 2014
Created by:
Kiel Wadner

Much has been written about using the Metasploit Framework, but what has received minimal attention is an analysis of how it accomplishes what it does. This paper provides an analysis of the post-exploitation activity of a Meterpreter shell on a compromised Windows 7 system. Areas looked at include the characteristics of the stager and payload, fingerprinting the HTTP C2 and beaconing traffic, finding Meterpreter in memory, and several post-exploitation modules that could be used. By focusing on what occurs instead of how to accomplish it, defenders are better equipped to detect and respond.