January 2025
Intermediate to advanced
288 pages
7h 12m
English
For convenience, this appendix lists the most frequently used commands and syntax within Metasploit’s various interfaces and utilities.
check Determine whether a target is vulnerable to an attack.
db_connect name Create and connect to a database (for example: db_connect autopwn).
db_create name Create a database to use with database-driven attacks (for example: db_create autopwn).
db_destroy Delete the current database.
db_destroy user:password@host:port/database Delete a database using advanced options.
db_nmap Use Nmap and place the results in a database; this command supports normal Nmap syntax, ...