How To Use Metasploit Commands (Part-2)

Metasploit commands

How to Use Metasploit Commands

Hello Friends! Today we are going to learn about some important Metasploit Commands. If you read my previous post on Metasploit Tutorial For Beginners (Part-1) then you know How to use Metasploit and If you read Hack a Windows Computer By Using a Simple Payload then you know How to use Metasploit. But after entering into the victim system which Metasploit commands we can use?




So, This is the main topic of our today’s post that is How to use Metasploit Commands.

Let’s Start 🙂

Metasploit Commands

There are different types of Metasploit commands. We will cover all Metasploit commands. Here is the complete list of Metasploit commands that we can use after exploiting any system.

Core Commands
=============

==>  To Open Help menu
banner ==> To display a beautiful Metasploit banner
cd ==> Change the current working directory
color ==> To Toggle color
connect ==> Communicate/Connect with the host
exit ==> Exit the console window
get ==> Get the value of a context-specific variable
getg ==> To Get the value of a global variable
grep ==> Grep the output of another command
help ==> To Open Help menu
history ==> Show the metasploit commands history
irb ==> Drop into irb scripting mode
load ==> Load the framework plugin
quit ==> Exit the console window
route ==> Route all the traffic through a session
save ==> Saves the active datastores
sessions ==> Dump the session listing and display the information about sessions
set ==> To Set the context-specific variable to a value
setg ==> To Set a global variable to a value
sleep ==> Do nothing for the number of seconds
spool ==> Write the console output into the file as well the screen
threads ==> View and manipulation of background threads
unload ==> Unload the framework plugin
unset ==> Unsets one or more context-specific variables
unsetg ==> Unsets one or more global variables
version ==> Show the Metasploit framework and console library version numbers

Module Commands
===============




advanced ==> Displays the advanced options for one or more modules
back ==> Move back from the current context
edit ==> Edit the current module/file with the suitable editor
info ==> Displays the information about one or more modules
loadpath ==>Searches for and loads modules from the path
options ==> Display the global options for one or more modules
popm ==> Pops the latest modules off the stack and makes it active
previous ==> Set the previously loaded modules as the current module
pushm ==> Pushes the active module or list the modules onto the module stack
reload_all ==> Reload all modules from all defined module paths
reload_lib ==> Load the library file from the specified path
search ==> Search module names and the descriptions
show ==> Display the modules of a given type, or all modules
use ==> Selects the module by its name

Job Commands
============

handler ==> Start a payload handler for exploiting the system
jobs ==> Displays and manage all the jobs
kill ==> Kill any job
rename_job ==> Rename any job

Resource Script Commands
========================

makerc ==> Save commands entered since the start to a file
resource ==> Run all the commands stored in a file

Database Backend Commands
=========================

db_connect ==> Connect to the existing database
db_disconnect ==> Disconnect from the current database instances
db_export ==> Export a file containing all the contents of the database
db_import ==> Import the scan result file (file-type will be auto-detected)
db_nmap ==> Execute Nmap and records output automatically
db_rebuild_cache ==> Rebuilds database-stored in the module cache
db_status ==> Show current database status
hosts ==> List every hosts in the database
loot ==> List all loots in the database
notes ==> List all the notes in the database
services ==> List all the services in the database
vulns ==> List all the vulnerabilities in the database
workspace ==> Switch between the databases workspace

Credentials Backend Commands
============================

creds ==> List all the credentials in the database

Leave a Reply

avatar

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  Subscribe  
Notify of