background image

276

Appendix B

info

Load information about a specific exploit or module.

use 

name

Load an exploit or module (example: 

use windows/smb/psexec

).

LHOST

Your local host’s IP address reachable by the target, often the public IP 
address when not on a local network. Typically used for reverse shells.

RHOST

The remote host or the target.

set 

function

Set a specific value (for example, 

LHOST

 or 

RHOST

).

setg 

function

Set a specific value globally (for example, 

LHOST

 or 

RHOST

).

show options

Show the options available for a module or exploit.

show targets

Show the platforms supported by the exploit.

set target 

num

Specify a specific target index if you know the OS and service pack.

set payload 

payload

Specify the payload to use.

show advanced

Show advanced options.

set autorunscript migrate -f

Automatically migrate to a separate process upon exploit completion.

check

Determine whether a target is vulnerable to an attack.

exploit

Execute the module or exploit and attack the target.

exploit -j

Run the exploit under the context of the job. (This will run the exploit 
in the background.)

exploit -z

Do not interact with the session after successful exploitation.

exploit -e 

encoder

Specify the payload encoder to use (example: 

exploit –e

 

shikata_ga_nai

).

exploit -h

Display help for the 

exploit

 command.

sessions -l

List available sessions (used when handling multiple shells).