Metasploit Cheat Sheet
Help link:
# This is initial SetUp and needed to be done only once. When you run metasploit for first time.
# We will start the database service.
sudo msfdb init
# We will enable postgresql at boot time.
sudo systemctl enable postgresql
# We will start the Metasploit
sudo msfconsole
# Check if you are connected with database or not.
db_statusGetting familar with command and interface
Creating work space in metasploit
Understanding Database backend command
Auxiliary Modules
Detecting vulnerability automatically and saving credential
Exploit modules
Payload Generation.
Below is online payload generator tool.
Click on "msfvenom" tab.
Type of payload
Meterpreter Payload
Executable payloads
Post Exploitation With metasploit.
Pivoting
It's important to use a bind shell like windows/x64/meterpreter/bind_tcp when adding a route, as this allows the attacker to connect to the target through the established route. Reverse shells may fail because the target typically lacks a route back to the attacker's network.
Automating task using resource script.
Last updated