Ethical Hacking and Penetration Testing Guide


Metasploit Basic Commands



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə117/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   ...   113   114   115   116   117   118   119   120   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

Metasploit Basic Commands
Now, we will take a look at some of the basic/important commands that we can use to navigate 
through Metasploit. We will learn more when we get to the practical matter.
Help
—This will display all the core commands.
MSfupdate
—This will automatically download any latest update, including latest exploits, pay-
loads, etc. It is one the first commands I run whenever I start Metasploit.
Show exploits
—This command would load all the exploits that are currently available in the 
Metasploit Framework.
Show payloads
—This command will load up all the payloads that are currently available in the 
Metasploit Framework. Speaking of payloads, in Metasploit, generally, you would use the 
following two payloads:
Bind shell
—When you initiate a connection to the victim
Reverse shell
—This is very helpful when our victim is behind a NAT and we cannot connect to 
him directly. In this case, bind shell won’t be of much helpful.
Show auxiliary
—You might be familiar with auxiliary modules as we have already used them. 
The auxiliary modules contain fingerprinting and enumeration tools, brute forcing tools
and various types of scanners.
Show post
—This would display all the modules we can use after we have compromised a target. 
We will talk a lot about them in the “Postexploitation” chapter (Chapter 9).
Search Feature in Metasploit
Metasploit has a search feature with which we could search for specific exploits, payload, auxil-
iary modules, etc. Let’s suppose that we are searching for exploits related to an ftp client named 
“filezilla.” We would execute the following command from within Metasploit:


Remote Exploitation
◾ 
181
Use Command
The “use” command would load a particular auxiliary/exploit module. Let’s suppose that we 
would like to use the exploit with the name 
/dos/windows/ftp/filezilla _ admin _
user
. We will then issue the following command to load that particular auxiliary module:
use auxiliary/dos/windows/ftp/filezilla_admin_user

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   ...   113   114   115   116   117   118   119   120   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin