276
Appendix B
info
Load information about a specific exploit or module.
use
name
Load an exploit or module (example:
use windows/smb/psexec
).
LHOST
Your local host’s IP address reachable by the target, often the public IP
address when not on a local network. Typically used for reverse shells.
RHOST
The remote host or the target.
set
function
Set a specific value (for example,
LHOST
or
RHOST
).
setg
function
Set a specific value globally (for example,
LHOST
or
RHOST
).
show options
Show the options available for a module or exploit.
show targets
Show the platforms supported by the exploit.
set target
num
Specify a specific target index if you know the OS and service pack.
set payload
payload
Specify the payload to use.
show advanced
Show advanced options.
set autorunscript migrate -f
Automatically migrate to a separate process upon exploit completion.
check
Determine whether a target is vulnerable to an attack.
exploit
Execute the module or exploit and attack the target.
exploit -j
Run the exploit under the context of the job. (This will run the exploit
in the background.)
exploit -z
Do not interact with the session after successful exploitation.
exploit -e
encoder
Specify the payload encoder to use (example:
exploit –e
shikata_ga_nai
).
exploit -h
Display help for the
exploit
command.
sessions -l
List available sessions (used when handling multiple shells).