Screen capture

Upon a successful compromise, we might want to know what activities and tasks are running on the compromised system. Taking a screenshot may give us some interesting information on what our victim is doing at that particular moment. In order to capture a screenshot of the compromised system remotely, we perform the following steps:

  1. Use the ps command to list all processes running on the target system along with their PIDs.
  2. Locate the explorer.exe process, and note down its PID.
  3. Migrate the meterpreter to the explorer.exe process, as shown in the following screenshot:

Once we have migrated meterpreter to explorer.exe, we load ...

Get The Complete Metasploit Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.