metasploit
Last updated
Last updated
rankings given in search
:
You can direct the search function using keywords such as type and platform:
Parameters you will often use are:
RHOSTS
: “Remote host”, the IP address of the target system. A single IP address or a network range can be set. This will support the CIDR (Classless Inter-Domain Routing) notation (/24, /16, etc.) or a network range (10.10.10.x – 10.10.10.y). You can also use a file where targets are listed, one target per line using file:/path/of/the/target_file.txt, as you can see below.
RPORT
: “Remote port”, the port on the target system the vulnerable application is running on.
PAYLOAD
: The payload you will use with the exploit.
LHOST
: “Localhost”, the attacking machine (your AttackBox or Kali Linux) IP address.
LPORT
: “Local port”, the port you will use for the reverse shell to connect back to. This is a port on your attacking machine, and you can set it to any port not used by any other application.
SESSION
: Each connection established to the target system using Metasploit will have a session ID. You will use this with post-exploitation modules that will connect to the target system using an existing connection.
explotation:
if you have username and password of a smb user:
handler:
post exploitation: