From charlesreid1

What Is It?

Meterpreter is a payload delivered to a target machine that communicates over a network using sockets. It's essentially an enhanced shell, and the client-side payload provides a Ruby API that enables it to be controlled with Metasploit.

Meteterpret Scripts

More details described here: https://www.offensive-security.com/metasploit-unleashed/meterpreter-basics/

Keylogging features described here: https://www.offensive-security.com/metasploit-unleashed/Keylogging/

Also: http://think-security.com/using-meterpreter-for-remote-keystroke-sniffing/

but I'm having trouble with some of that.

Hash dumping: https://community.rapid7.com/community/metasploit/blog/2010/01/01/safe-reliable-hash-dumping

Some built-in scripts: https://www.offensive-security.com/metasploit-unleashed/existing-scripts/

How to use, from wikibooks: https://en.wikibooks.org/wiki/Metasploit/MeterpreterClient

Stealing Memory with MDD

http://wiki.securityweekly.com/wiki/index.php/Episode142

Why Meterpreter is Better

Meterpreter is an entirely in-memory tool, and writes nothing to disk.

It uses encrypted communications - so replaces cryptcat.

It provides additional functionality that a basic netcat or cryptcat shell might not provide.

How To Use

Some commands and info here: https://en.wikibooks.org/wiki/Metasploit/MeterpreterClient

Flags