CYBER 101

  • Alerts
  • Blog
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Join our newsletter

FOLLOW US

  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial

Metasploit Cheat Sheet

by Sophie C.

5 min read
in Cheat Sheet

Metasploit helps security teams identify and verify vulnerabilities, improve security awareness and manage gnarly security situations. The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7.

What will you find in the Metasploit Cheat Sheet: Framework Components, Meterpreter commands, Networking commands, Interface / output commands, Password management commands, Process handling commands, Msfvenom command options.

Framework Components:

Metasploit Meterpreter: The Meterpreter is a payload within the Metasploit Framework that provides control over an exploited target system, running as a DLL loaded inside of any process on a target machine.

Metasploit msfvenom: The msfvenom tool is a component of the Metasploit Framework that allows users to generate a standalone version of any payload within the framework. Payloads can be generated in a variety of formats including executable, Ruby script, and raw shellcode. The msfvenom tool can also encode payloads to help avoid detection.

Meterpreter commands: 

? or Help  Shows all the available commands
background Move active session to background
Bgkill Terminate a background process
bglist Show background running scripts
bgrun Make a script run in background
cat Display file content
cd or lcd Change directory (local or remote)
channel Show active channels
clearev Clear the system logs
edit  Edit a file in vi editor
exit / quit  Exit the Meterpreter session
getuid Display user ID
idletime Display idle time of user
kill (PID) Terminate a running process
migrate  Switch to another process
ps List and display running processes
pwd or lpwd Print working directory (local / remote)
screenshot Take a screenshot
shell Access shell on the target machine
shutdown / reboot Restart system
sysinfo Display system information
upload or download Upload / download a file
use Extension load

Networking commands:

ipconfig: Show network interface configuration
portfwd: Forward packets
route: View / edit network routing table

Process handling commands:

execute:  Run a specified
getpid Display the process ID
getprivs Shows multiple privileges as possible
getuid Display the user ID
kill Stop and terminate a process
migrate Move to a given destination process ID
ps:  Display running processes
reg  Access target machine registry
Shell Access target machine shell

Interface / output commands:

enumdesktops Show all available desktops
getdesktop Display current desktop
keyscan_dump Dump keylogger content
keyscan_start Start keylogger in target machine
keyscan_stop Stop keylogger in target machine
set_desktop Configure desktop

Password management commands:

hashdump Access content of password file – Hash file

Msfvenom command options:

-a -a (Architecture or platform) Define which platform to use
-b -b (characters) Define set of characters not to use
-e -e(encoder) Define which encoder to use
-f -f (format) Output format
-h -h Help
-i -i (Number of times) Define number of times to use encoder
-l -l( list type) List module type i.e payloads, encoders
-o -o (output) Save a payload
-p -p (Payload option) Display payload standard options
-s -s (Space) Define maximum payload capacity
-x -x (File name ) Define a custom file to use as template

 

Related

Tags: Cheat SheetCyber Professionals DocumentsKali LinuxMetasploitMeterpreterMsfvenom
91
VIEWS
ADVERTISEMENT

Related Posts

Incident Response Cheat Sheet

Incident Response Cheat Sheet

August 11, 2022
CYBERSECURITY RESOURCES ROAD MAP

CYBERSECURITY RESOURCES ROAD MAP

August 8, 2022
IAST vs DAST and SAST

IAST vs DAST and SAST

July 25, 2022
SAST vs. DAST

SAST vs. DAST

July 25, 2022

More Articles

How Walgreens’ sloppy Covid-19 test registration system exposed patient data

September 15, 2021
Tool

Security Assessments

June 15, 2022
Alerts

CISA Adds 34 Known Exploited Vulnerabilities

May 25, 2022

File Infectors

January 12, 2021

Acceptable interruption window

October 13, 2020

REPORT: 2020 Securonix Insider Threat Report

February 3, 2021
Alerts

IBM security advisory (AV22-088)

February 21, 2022
Entertainment

Terminal Error (2002)

October 17, 2020
Load More

Security through data

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
Search

More...

Generic filters
Filter by Categories
Alerts
Blog
Book
Incidents
Quotes
Tutorials
Certification
Cheat Sheet
Course
Game
Meme
Movie
Paper
Podcast
Report
Software
TV Show

Try these: DDoSGDPRMalware

  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Join our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.