During a penetration test, you have successfully exploited a vulnerability on a Windows server and have gained access to the cmd.exe command shell. You want to upgrade this shell to have enhanced capabilities, including the ability to transfer files securely and manipulate the Windows Registry from your attack platform. Which of the following actions would BEST accomplish this?
Open a PowerShell session to utilize its native features
Initiate an SSH connection to the server to enable secure file transfers
Connect to the server with a Telnet client to achieve persistent access
Use the cmd.exe shell to manually transfer files using FTP
Generate a Meterpreter payload and execute it on the target system to upgrade the shell
Deploy an additional cmd.exe shell for registry manipulation