systemctl start postgresql
cp /usr/share/exploitdb/exploits/cgi/webapps/42344.rb /root/.msf4/modules/exploits/cgi/webapps/
updatedb sessions -u
- search delivery for web payload deliver
- search autoroute for session routes
- search smb_version
- search arp_sweep
Vulnerability Scanning in Metasploit
db_nmap -v --script vuln 192.168.0.184
- hosts
- services
Port forwaring
portfwd add –l 3389 –p 3389 –r target-host
Forwards 3389 (RDP) to 3389 on the compromised machine running the Meterpreter shell