Professional Documents
Culture Documents
Commands Crash Course
Commands Crash Course
Commands Crash Course
Now you should be ready to fire up Metasploit. Metasploit should already be installed on the machine that you’re using(Windows
or Linux), so to start the console, simply run “msfconsole”.
Before getting to exploits straight away, it is useful to understand what some Metasploit commands do. Below are some of the
command that are used in almost every exploit procedure. It is vital that you get familiar with these : (Below I’ve listed example
commands followed by their instructions in the next lines)
► use exploitname
Tells Metasploit to use the exploit with a specified name.
► set RHOST hostname_or_ip
Will instruct Metasploit to target the specified remote host.
► set RPORT host_port
Sets the port that Metasploit will connect to on the remote host.
► set PAYLOAD generic/shell_bind_tcp
As an example, this command sets the payload to a generic one that will give you access to a shell when a service is exploited.