Created
June 14, 2017 21:10
-
-
Save vijayanandrp/a0787d7ce8fc3f095ca9fd79fe608e10 to your computer and use it in GitHub Desktop.
Learn the basics of Metasploit Framework in 5 minutes !!
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#To explore the metasploit framework | |
cd /usr/share/metasploit-framework/ | |
#To explore the modules | |
cd modules/ | |
#To explore the available exploits | |
cd exploits/ | |
#Before using the metasploit start the Postgres SQL database which will use to track what you do | |
service postgresql start | |
#Start the Metasploit remote procedure call (RPC) server and also the web server | |
service metasploit start | |
Creating metasploit database user 'msf3'... | |
Creating metasploit database 'msf3'... | |
insserv: warning: current start runlevel(s) (empty) of script `metasploit' overrides LSB defaults (2 3 4 5). | |
insserv: warning: current stop runlevel(s) (0 1 2 3 4 5 6) of script `metasploit' overrides LSB defaults (0 1 6). | |
[ ok ] Starting Metasploit rpc server: prosvc. | |
[ ok ] Starting Metasploit web server: thin. | |
[ ok ] Starting Metasploit worker: worker. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment