Metasploit Cheatsheet
Table of Contents
enabling the database#
Metasploit can be configured to save the loot in the database for reference. The loot includes, among others, stuff like hosts, creds and vulns.
It’s worth running db_import without a parameter to ensure the connection with the database is actually working, as db_status might lie.
workspaces#
hosts#
creds#
search for and use the modules#
ports scanning#
services#
global settings#
sessions#
shell commands#
combining Metasploit with Nmap#
💡 You can also use
rustscan.
importing modules to Metasploit#
Not every Metasploit payload is available to find with search. If we stumble upon one, e.g. on Exploit-DB, we can import it to Metasploit by copying or symlinking it:
💡
python-based modules might need code adjustments to work with Metasploit
services that host payloads#
- Exploit-DB - you probably know that one anyway
- Sploitus
- Packet Storm
- 0day.today
dank meme#
