Metasploit
Start
Update
sudo apt update && sudo apt install metasploit-framework msfupdate
Run
msfconsole
msfconsole -q
service postgresql start && msfconsole
Database
Initialization
msfdb init
msfdb reinit
Check
db_status
Help
help database
Workspace
Help
workspace -h
Listing
workspace
Selecting
workspace <NAME>
New
workspace -a <NAME>
Delate workspace
workspace -d
Delete all workspace
workspace -D
Nmap
db_nmap <COMMAND_NMAP>
Display data
<TYPE> -h
hosts
services
creds
loot
analyze
vulns
notes
route
Export
db_export -f xml
Import
db_import <FILE_SCAN_NESSUS.nessus>
db_import <FILE_SCAN_NMAP.xml>
Command
Help
help
<COMMAND >-h
Refresh
reload_all
Search modules
<type>/<os>/<service>/<name>
Type: exploits, payloads, auxiliary, post, etc.
search <STRING>
search type:<TYPE> name:<STRING> [<KEYWORD>:<VALUE>]
Filter
grep <STRING1> grep <STRING2> <COMMAND>
Info module
info <N>
Select module
use <N>
Setting Options
show options
set <VARIABLE> <VALUE>
show advanced
Setting Payload
show payloads
set payload <N>
Setting Target
show targets
set target <N>
Encoders
show encoders
Setting Global
setg <VARIABLE> <VALUE>
Run
check
run
exploit
exploit -e <shikata_ga_nai>
Sessions
Help
sessions -h
Listing
sessions
Upgrade
sessions -u <ID>
Resume
sessions -i <ID>
Close
sessions -k <ID>
Close all
sessions -K
Job
Help
jobs -h
Start exploit in jobs
exploit -j
Listing
jobs -l
Close
jobs -k <ID>
Close all
jobs -K
Meterpreter
Help
help
<COMMAND> -h
Local command
l<COMMAND>
Modules
run <MODULES>
post/multi/recon/local_exploit_suggester
Migrate
ps
(explorer or lsas)
pgrep <NAME>
migrate <PID>
Background
background
CTRL+Z
Close
exit
CTRL+C
To obtain it
exploit/multi/script/web_delivery
exploit/windows/smb/smb_delivery
or Exploits
Plugin
Add plugin in /usr/share/metasploit-framework/plugins
Non-Staged & Staged
Non-Staged
Single payload. es. windows/shell_bind_tcp
Staged
Two part. es. in windows/shell/bind_tcp
Last updated