Before starting the exploitation phase, you must know the Metasploit framework from start to finish, so I have prepared a quick reference (a cheat sheet) to the Metasploit framework for you.
- Tech Categories
- Best Sellers
- New Releases
- Books
- Videos
- Audiobooks
Tech Categories Popular Audiobooks
- Articles
- Newsletters
- Free Learning
You're reading from Practical Web Penetration Testing
Gus Khawaja holds a bachelor's degree in computer science. He specializes in IT security and ethical hacking. He is an author and shares his passion with millions of viewers around the world using his online courses. He also works as a cybersecurity consultant in Montreal, Canada. After many years of experience in programming, he turned his attention to cybersecurity and the importance that security brings to this minefield. His passion for the ethical hacking mixed with his background in programming and IT makes him a wise swiss-knife professional in the computer science domain.
Read more about Gus Khawaja
Metasploit framework
Start a Metasploit with the following script file:
$msfconsole -r test.rc
To run Metasploit, use the following command:
$msfconsole
Using the database
In Kali Linux, you will need to start up the postgresql server before using the database:
$ systemctl start postgresql
After starting postgresql, you will need to create and initialize the msf database with msfdb init:
$ msfdb init
If you just created a new exploit and want to refresh metasploit db to start using the newly created exploit, enter the following:
$service postgresql restart && msfdb reinit
Then, type the following command:
$msfconsole -q
The -q will start msfconsole in debug mode, so if you made mistakes in your new exploit class, the...
Unlock this book and the full library FREE for 7 days
Author (1)
Gus Khawaja holds a bachelor's degree in computer science. He specializes in IT security and ethical hacking. He is an author and shares his passion with millions of viewers around the world using his online courses. He also works as a cybersecurity consultant in Montreal, Canada. After many years of experience in programming, he turned his attention to cybersecurity and the importance that security brings to this minefield. His passion for the ethical hacking mixed with his background in programming and IT makes him a wise swiss-knife professional in the computer science domain.
Read more about Gus Khawaja