An Analysis of Meterpreter during Post-Exploitation

Much has been written about using the Metasploit Framework, but what has received minimal attention is an analysis of how it accomplishes what it does. This paper provides an analysis of the post-exploitation activity of a Meterpreter shell on a compromised Windows 7 system. Areas looked at include...
By
Kiel Wadner
October 10, 2014

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg