Kali Linux and their are dozen of topics to be discussed; every tool,
technique and procedure have their own merits and demerits and the
usage depends on the objective of the attack. So what is Meterpreter?
As offensive-security says:
“Meterpreter is an
advanced, dynamically extensible payload that uses in-memory DLL
injection stagers and is extended over the network at runtime. It
communicates over the stager socket and provides a comprehensive
client-side Ruby API. It features command history, tab completion,
channels, and more.”
tutorial on using Metasploit to create an EXE with the Meterpreter
payload that creates a reverse TCP connection outbound, blowing
through many NAT boxes and firewalls.