During a penetration test, you have successfully exploited a vulnerability on a Windows server and have gained access to the cmd.exe command shell. You want to upgrade this shell to have enhanced capabilities, including the ability to transfer files securely and manipulate the Windows Registry from your attack platform. Which of the following actions would BEST accomplish this?
Deploy an additional cmd.exe shell for registry manipulation
Connect to the server with a Telnet client to achieve persistent access
Generate a Meterpreter payload and execute it on the target system to upgrade the shell
Use the cmd.exe shell to manually transfer files using FTP
Initiate an SSH connection to the server to enable secure file transfers
Open a PowerShell session to utilize its native features