🗄️ Database
💡 Purpose
Track scan results, discovered credentials, vulnerabilities, etc.
Integrate with third-party tools (e.g., Nmap, Nessus).
Configure exploit modules using saved data.
⚙️ Setting Up the Database
1. Check PostgreSQL status
2. Start PostgreSQL
3. Initialize the Metasploit database
If you get an error (e.g., NoMethodError
), try:
4. Check database status
5. Run Metasploit with DB connected
💬 Inside msfconsole
msfconsole
🔍 Check DB Connection
🔁 Reinitialize DB (if needed)
📁 Workspaces
🧭 Usage
📥 Import Nmap Scans
Preferred format: .xml
.xml
🔎 Using db_nmap
directly
db_nmap
directly💾 Exporting Data
🔧 Key Commands
hosts
– Manage discovered hosts
hosts
– Manage discovered hostsservices
– View open services
services
– View open servicescreds
– Manage credentials
creds
– Manage credentialsloot
– View captured data
loot
– View captured dataLet me know if you want flashcards or quizzes based on this 💡
Last updated