Metasploit
cheatsheet for metasploit console and modules
Upgrade
apt update; apt install metasploit-frameworkMsfconsole
msfconsole -qExploit selection
Search
search platform:<windows/linux/macos> type:exploit name:<keyword>Keywords:
app : <client/server>
author : <author>
bid : <bugtrack ID>
cve : <CVE code>
edb : <exploit-db code>
name : <keyword>
platform : <windows/linux/macos/...>
ref : Modules with a matching ref
type : <exploit/auxiliary/post>Show
Exploit configuration
Show details
Set options
Generally it is required to select a payload by running set payload <payload>. To see a list of compatible payloads run show payloads. Some exploits require to specify a target, in order to do so run set target <target>, a list of targets is provided by running show targets. By default the exploit may try to pick the most suitable target by guessing from other user-set options or during exploitation phase.
Execution and sessions
Payload execution
Sessions
Handlers
Listens for a connection from a remote host to the specified port. Useful when running exploits not generated by msf or waiting for a backdoor to come online.
Last updated