🧰 Modules
📁 Module Structure
Syntax:
Example:
Module Components:
Index No.
Number shown in search results for quick selection (use <no.>
)
Type
One of: auxiliary
, encoder
, exploit
, nop
, payload
, plugin
, post
OS
Target operating system (e.g., Windows, Linux)
Service
Service involved (e.g., SMB, FTP)
Name
Explains the module's purpose
Only auxiliary
, exploit
, and post
can be directly run with use <no.>
.
🔍 Searching for Modules
Command:
Example:
Refined Example:
🎯 Selecting a Module (MS17-010 Example)
Scan Target
Search Module
Use Exploit Module
Show Options
Set RHOST
Set LHOST
Run the Exploit
📋 Output from Successful Exploitation
💡 Tips & Best Practices
Use
info
to get detailed module description:
Use
setg
to globally persist variables like RHOSTS or LHOST:
Metasploit payloads like
windows/meterpreter/reverse_tcp
allow interactive control.
Let me know if you'd like this in a downloadable format or expanded with post-exploitation commands!
Last updated