Metasploit

cheatsheet for metasploit console and modules

Upgrade

apt update; apt install metasploit-framework

Msfconsole

msfconsole -q

Exploit selection

search platform:<windows/linux/macos> type:exploit name:<keyword>

Keywords:

  app       :  <client/server>
  author    :  <author>
  bid       :  <bugtrack ID>
  cve       :  <CVE code>
  edb       :  <exploit-db code>
  name      :  <keyword>
  platform  :  <windows/linux/macos/...>
  ref       :  Modules with a matching ref
  type      :  <exploit/auxiliary/post>

Show

Exploit configuration

Show details

Set options

Generally it is required to select a payload by running set payload <payload>. To see a list of compatible payloads run show payloads. Some exploits require to specify a target, in order to do so run set target <target>, a list of targets is provided by running show targets. By default the exploit may try to pick the most suitable target by guessing from other user-set options or during exploitation phase.

Execution and sessions

Payload execution

Sessions

Handlers

Listens for a connection from a remote host to the specified port. Useful when running exploits not generated by msf or waiting for a backdoor to come online.

Last updated