Skip to Content
Metasploit, 2nd Edition
book

Metasploit, 2nd Edition

by David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman
January 2025
Intermediate to advanced
288 pages
7h 12m
English
No Starch Press
Content preview from Metasploit, 2nd Edition

B CHEAT SHEET

For convenience, this appendix lists the most frequently used commands and syntax within Metasploit’s various interfaces and utilities.

MSFconsole

check   Determine whether a target is vulnerable to an attack.

db_connect name   Create and connect to a database (for example: db_connect autopwn).

db_create name   Create a database to use with database-driven attacks (for example: db_create autopwn).

db_destroy   Delete the current database.

db_destroy user:password@host:port/database   Delete a database using advanced options.

db_nmap   Use Nmap and place the results in a database; this command supports normal Nmap syntax, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hacking: The Art of Exploitation, 2nd Edition

Hacking: The Art of Exploitation, 2nd Edition

Jon Erickson
Security in Computing, 6th Edition

Security in Computing, 6th Edition

Charles Pfleeger, Shari Lawrence Pfleeger, Lizzie Coles-Kemp
Serious Cryptography, 2nd Edition

Serious Cryptography, 2nd Edition

Jean-Philippe Aumasson

Publisher Resources

ISBN: 9798341620032Errata Page