Главная
Study mode:
on
1
Goals
2
What is Meterpreter?
3
What is it made of?
4
Sample Scenario
5
Stage Construction
6
Reflective DLL Injection
7
RDI Steps 1. Locate the image in memory
8
RDI Walkthrough
9
Step 1
10
Step 2
11
Step 3
12
Step 4
13
Step 5
14
Relocation
15
Step 6
16
Command Definition
17
Command Registration
18
Exploitation
19
Migration in Metasploit
20
Type, Length, Value
21
Migration TLVS
22
Back to Ruby ...
23
Migration in Meterpeter
24
Migrate Context
25
Migration in Meterpreter
26
Migrated Payload Exec
27
Migration Completes!
28
The "links" Slide
Description:
Dive into the inner workings of Meterpreter, Metasploit's popular Windows payload, in this 56-minute conference talk from the 44CON Information Security Conference. Explore the lifecycle, architecture, and technical details of Meterpreter, including Reflective DLL Injection and Migration. Learn how it operates in memory, avoids disk detection, and hides from the operating system. Gain insights into the construction process, command definition and registration, exploitation techniques, and the intricacies of payload migration. Suitable for those with low-level knowledge and an interest in the technical aspects of penetration testing tools.

Meterpreter Internals

44CON Information Security Conference
Add to list