Our social:

Lean About metasploit for penetration tester PART - 2

Hello friends,..!! Welcome to HackHackers..!!

BEFORE READING THIS ARTICLE I WILL SUGGEST YOU TO READ MY PREVIOUS ARTICLE :

READ : INTRODUCTION TO METASPLOIT FOR PENETRATION TESTING



MSFCONSOLE 

The msfconsole is probably the most popular interface to the Metasploit Framework (MSF). It provides an “all-in-one” centralized console and allows you efficient access to virtually all of the options available in the MSF. Msfconsole may seem intimidating at first, but once you learn the syntax of the commands you will learn to appreciate the power of utilizing this interface.

With msfconsole, you can access and use all Metasploit plug-ins, payloads, the use exploit modules, post module and so on. MSFCONSOLE interface can integrate to third-party programs as well, such as nmap, sqlmap, etc., can be used directly in msfconsole inside.

To start MSFCONSOLE, you need only type msfconsole on your command prompt window.

When msfconsole is started, you can view all exploits modules, auxiliary modules; all payloads on Metasploit-Framework.


On Msfconsole, there are two options to view the help:
1 )  msfconsole -h   :    displayed in msfconsole initialization


2 ) msfconsole -help -- can be used after entering msfconsole display.


MSFCONSOLE parameter


1 ) Banner --  view metasploit version information, view all modules



2 ) Back -- Used to return.


3 ) chech -- many of the modules do not support the use of this parameter


4 ) color --  set some color command line


5 ) Connect -- Used for remote connection to the host .

ALSO READ : 6 BASIC COMMANDS TO START WITH LINUX TERMINAL


6 ) edit -- Edit the current module .


7 ) info -- view information, including the option to take advantage of the conditions, the vulnerability author, you can use the payload, and so on.


8 ) irb --  enter irb script mode, and execute commands to create the script.


9 ) jobs --  can be viewed on msfconsole, you can check which task currently exist, and can choose to end task unwanted.


10 ) kill -- can terminate unwanted processes

ALSO READ : HOW TO CRACK WPA/WPA2 WIFI PASSWORD 

11) load/unload --  load/unload a number of plug-in from inside the plug metasploit library


12 ) resource -- run some resource files, some tools, such as Karmetasploit very need this parameter.


13 ) route -- The forwarding agent


 14 ) search -- find modules that you want to use


15 ) Search by name :


16 ) Search by name + type and more 


17 ) set/unset -- setting/un-setting paramter of modules


18 ) show -- show all of the payload, the ese of modules, post modules, plugins and so on


19 ) use -- use module



That's it ..!! Hope you like it..!! If you want more tutorials in metasploit tell me in comment box .