Part 11 - Using the Search Function
Video Activity
This lesson covers using the search function. The search function is useful within the metasploit framework as well as within the meterpreter shell. This allows you to look within a particular directory.
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Description
This lesson covers using the search function. The search function is useful within the metasploit framework as well as within the meterpreter shell. This allows you to look within a particular directory.
Video Transcription
00:04
okay, And last topic we're gonna cover for post exploitation
00:09
is using the search function.
00:13
Search functions pretty useful from within
00:16
The Mets play framework, but it's also useful from within the interpreter shell. So if I run search dash H, get my help and, er I can look in a particular directory by using the dash D option,
00:29
I could also use
00:31
wild cards and follow on clubbing patterns as we see here.
00:35
And I could even recurve reclusive Lee search directories, which is true by default, which is handy because you want to be able to
00:43
search for something that is in a little of a folder from the one that you're currently trying to look for.
00:49
So what I can do is I can say I want to search a directory
00:54
and let's do you something
00:58
like, uh, users,
01:00
I e. User
01:04
and I want to search
01:07
using the glove option so I'll just look for,
01:11
uh, all yeah, CSI vials
01:15
and found quite a few some of these Aaron and hidden folders. It also found, uh,
01:21
the payloads and I put up here earlier.
01:25
Thought I could just surge
01:29
a, uh,
01:30
the entire system, for instance,
01:33
wanna look for, like all the J peg files
01:36
that are contained on this victim system.
01:38
It might take a minute to actually run, of course,
01:42
but quite a few files here. Look at
01:49
a lot more J pegs, and you might expect, but it depends what kind of applications are installed. Maybe I'm more interested in things like P D efs because those might have useful data. No, no, no. P s were found,
02:02
but there could be, uh,
02:06
you know, word documents,
02:07
maybe some rich, rich text formats
02:14
documents our t s.
02:17
Well, quite a few of those.
02:20
Some of these might be an interesting folder, like my users directories. Maybe there's something.
02:24
For instance, I was go back to
02:29
change this to Artie F.
02:31
Oh, look at that. I found in inventory
02:35
document called inventory on the user's desktop. Could be some interesting information there that could be beneficial for the pen test.
02:45
All right, so there are certainly lots more things you can do after you've exploited system. This is just a light sampling of some of the tips and techniques to get you started.
02:53
I'll see you in the next section. Thank you.
Up Next
Similar Content