Skip to Content
Practical Web Penetration Testing
book

Practical Web Penetration Testing

by Gus Khawaja
June 2018
Intermediate to advanced
294 pages
7h 5m
English
Packt Publishing
Content preview from Practical Web Penetration Testing

Miscellaneous

  • msf > load [plugin name]: The load command loads a plugin from Metasploit's plugin directory. Arguments are passed as key=val on the shell. For example, load pcap_log.
  • msf > unload [plugin name]: The unload command unloads a previously loaded plugin and removes any extended commands. For example, unload pcap_log.
  • msf > loadpath [module path]: The loadpath command will load a third-party module tree for the path so you can point Metasploit at your 0-day exploits, encoders, payloads, and so on. For example, loadpath exploit/windows/test/test_module.
  • msf > connect [IP]: This is similar to netcat. It is good for banner grabbing and interacting with the service. For example, connect 192.168.1.10.
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hands-On Web Penetration Testing with Metasploit

Hands-On Web Penetration Testing with Metasploit

Harpreet Singh, Himanshu Sharma
Penetration Testing

Penetration Testing

Georgia Weidman

Publisher Resources

ISBN: 9781788624039Supplemental Content