Basic Commands
msfconsole to start
db_status to check the status of the database
Help Menu
search to find modules
use to use modules
info
connect to verify possible netcat connection
save to save session
Variables
set
setg to set a variable globally
unset to set null
get to get a value
spool to save our console output as a file
Core
there are 5 types of modules
- payload
 - exploit
 - auxiliary
 - NOP
 - post
 
Shell Utilities
the first thing to do would be an db_nmap -sV [ip]
this allows to see hosts and services . Very useful
You could also try vulns.
Meterpreter
Windows
ps to see processes
migrate to migrate process
getuid to find informations about the user
sysinfo to find informations about the system
getprivs to see privileges
upload to transfer files to the victim
run to run a post/ module
ipconfig to information about intefaces
POST
post/windows/gather/checkvm to see if the machine is a vm
post/multi/recon/local_exploit_suggester to suggest some exploits
post/windows/menage/enable_rdp to try forcing rdp to be available
Linux
Options
Parameters you will often use are:
- RHOSTS: “Remote host”, the IP address of the target system. A single IP address or a network range can be set. This will support the CIDR (Classless Inter-Domain Routing) notation (/24, /16, etc.) or a network range (10.10.10.x – 10.10.10.y). You can also use a file where targets are listed, one target per line using file:/path/of/the/target_file.txt, as you can see below.
 

- RPORT: “Remote port”, the port on the target system the vulnerable application is running on.
 - PAYLOAD: The payload you will use with the exploit.
 - LHOST: “Localhost”, the attacking machine (your AttackBox or Kali Linux) IP address.
 - LPORT: “Local port”, the port you will use for the reverse shell to connect back to. This is a port on your attacking machine, and you can set it to any port not used by any other application.
 - SESSION: Each connection established to the target system using Metasploit will have a session ID. You will use this with post-exploitation modules that will connect to the target system using an existing connection.