This is an old revision of the document!


Network Security in Practice with Metasploit

Great HOWTO guide for Metasploit http://www.offensive-security.com/metasploit-unleashed/Main_Page

If you want vulnerable stuff for hacking, go for Metasploitable

Commands in Metasploit we've used:

help - shows general Metasploit commands
search "vulnerability/scanner/exploit" - helps you search for appropriate Metasploit module
use "path to metasploit module" - loads the module for you
info - within loaded module shows you info about usage and additional commands
show options - within loaded module shows variables that must be set for the module to be executed
run/exploit - runs the module
db_nmap - runs nmap and stores gathered information into Metasploit Database
hosts/services/vulnerabilities - shows host/services/vulnerabilities in Metasploit database
workspace - allows you to work with Metasploit workspaces