Metasploit for the Aspiring Ethical Hacker, Part 2

Part 1 is here:

In this second tutorial, we will look at some of the basic commands we can use in Metasploit. Although the Metasploit framework can appear daunting to the uninitiated, it is actually a very simply framework for system exploitation. If you can learn a few keywords and techniques, you can use Metasploit to hack just about any system.

Featured Image -- 5213
Linux Courses on sale NOW!!

Metasploit Keywords

Undersatnding and using a few keywords in Metasploit can help you navigate and operate this powerful piece of software. Let’s look a few of the most basic and necessary Metasploit commands. This is far from an exhaustive list of Metasploit keywords and commands, but it covers the basic commands you need to function in Metasploit until you gain more experience.

If you already have a little experience in Metasploit and want commands for the meterpreter, check out my meterpreter commands cheat sheet.


“Show” is one of the most basic commands in Metasploit. It can be used to show modules, such as show payloads, show exploits, etc. But, it also can be used to show options once we have an exploit chosen.

The “show” command becomes context sensitive when we choose an exploit, so that if we type “show payloads” before selecting an exploit, it will show us ALL the payloads. If we type “show payloads” after selecting an exploit, it will only show us the payloads that will work with that exploit.

For instance, when we want see all the options that we need to set when installing a backdoor with an innocent-looking PDF, we use the “show options” command as below.


The “help” command will give you a limited list of commands you can use in msfconsole. If you lose this guide, simply type “help” to get some basic commands.



“Info” is another basic command in Metasploit that enables us to see all the basic information about an exploit. After selecting an exploit, we can then type “info” and it will display all of the options, targets, and a description for the exploit. I prefer to type “info” on any exploit I am using to find or remind myself of its features and requirements.

For instance, here is screenshot from the output from the “info” command when using the ftp auxiliary module.


“Set” is a basic and critical command/keyword in Metasploit. We can use it to set parameters and variables necessary to run the exploit. These variables can include the payload, the RHOST, the LHOST, the target, URIPATH, etc.

In the screenshot below from my tutorial on using psexec to hack a system, we set RHOST, LHOST, SMBUser, and the SMBPass to hack the system without leaving a trace.


When we are done working with a particular module or we chose the wrong module, we can use the “back” command to return to the msfconsole prompt.

For instance, if we chose an exploit and then realized we chose the wrong one, we can simply type “back” and then use the “use” command (see next section) to select another module.


When we have decided which exploit we want to use against our target system, we use the “use” command to load that exploit into memory and ready it to send to the target system. An example can be found in my tutorial on using the Heartbleed vulnerability to grab information in memory from systems running OpenSSL.


After choosing our exploit, setting all of our variables, and choosing our payload, the last thing we do is to type the “exploit” command. This launches the exploit against the target machine with the payload and any variables we might have set.

An example of this can be found in my guide on creating an exploit in an innocent-looking Word doc and sending it to your girlfriend to see whether or not she is cheating.


The “sessions” command is used to list or set a session. When used with the -l (list) switch, it will list all open sessions. When used with a number (“sessions -1”), it tells Metasploit to activate the first session.

Metasploit allows us to run multiple sessions on the same system or multiple sessions on multiple systems. Using the “sessions” command, we can find these open sessions and switch to or activate them.

You can find an example of this in my guide on creating an auto-reconnecting persistent backdoor on the target system, as seen below.


When we want to leave the msfconsole, we can simply type “exit” to return to our Linux shell.

This should provide you with a basic command set that will enable you to run just about any hack in Metasploit.

via Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 2 (Keywords) « Null Byte :: WonderHowTo


1 Comment

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.