Metasploit Framework (MSF)
Last updated
Last updated
The world’s most used penetration testing framework
Start db
or
Start metasploit framework console
Select exploit
Run exploit
or
Show options
Show advanced options
Set option
Set option (global)
Show payloads
Select payload
Show sessions
Interact with session
Send session to background
The shell command will present you with a standard shell on the target system.
Metasploit has a Meterpreter script, getsystem, that will use a number of different techniques to attempt to gain SYSTEM level privileges on the remote system.
Show encoders
Select encoder
Search for exploits
Go back
Display help
Get info about current context?
Just start listener
Start job in background
Show jobs
This module suggests local meterpreter exploits that can be used.
This module extracts the plain-text Windows user login password in Registry.
This module will login with the specified username/password and execute the supplied command as a hidden process.
Upgrade shell to meterpreter shell
Migrate to other (e.g. more stable) process
Get system info
Port forwarding
Look for privileges like SeImpersonatePrivilege
, SeDebugPrivilege
, etc.
Load incognito module and list available tokens
Impersonate e.g. BUILTIN\Administrators
Migrate to a process with the correct permission, to actually get the elevated permissions (token != permission).
Resource scripts provide an easy way for you to automate repetitive tasks in Metasploit.