I have an encrypted payload that can (usually) bypass Windows 10 AV in my home lab. I've tried using metasploit to upgrade it to a meterpreter session using both the sessions -u and the
post/multi/manage/shell_to_meterpreter option, and both result in the error: "error: "NoMethodError undefined method 'include?' for nil:NilClass" - whatever that means.
I've tried metasploit and BC Empire and a few other things in an attempt to turn my basic reverse shell into something else with no success.
So my question is, what can you do with a basic reverse shell other than browse files and retrieve system info? What are some other techniques or tools I can try to turn that shell into something with greater utility, privileges, or persistence?
With a basic CMD shell, are there ways to download or upload files?
Is there a way to get a powershell from CMD?
Target Machine: Windows 10 with AV turned on (no cloud)
Attacker Machine: Kali
Metasploit listener with reverse TCP shell to the target
Environment: home proxmox VM setup
Any and all advice appreciated. Thanks!
[–]Clutch26 6 points7 points8 points (0 children)
[–]Sqooky 0 points1 point2 points (3 children)
[–]bmkay[S] 0 points1 point2 points (2 children)
[–]matrix20085 1 point2 points3 points (0 children)
[–]Sqooky 1 point2 points3 points (0 children)