metasploit | install | maintenance | discovery
as root otherwise you cannot scan UDP from within the framework
workspace -h workspace -v
==> default is fine
ping scan to begin with
db_nmap -sn -T3 x.x.x.x/x
then an easy-peasy top 1000 for those who did not answer
db_nmap -Pn -sV -A -T3 x.x.x.x/x # -sTUV # -sS -n -v
use auxiliary/scanner/portscan/tcp show options
known hosts go as RHOSTS
# ping scan hosts -R # top 1000 & OS scan hosts -S Linux -R run
hosts hosts -c address,os_name,os_flavor hosts -S Linux
services services -c name,info services -c info,name -p 445 services -c port,proto,state -p 80,443
https://github.com/rapid7/metasploit-framework/wiki/Using-Metasploit
https://www.offensive-security.com/metasploit-unleashed/msfconsole-commands/
https://www.andreafortuna.org/2017/12/11/metasploit-console-my-own-cheatsheet/
https://www.rapid7.com/db/modules/
http://travisaltman.com/metasploit-set-rhosts-file/
https://www.offensive-security.com/metasploit-unleashed/meterpreter-basics/
https://docs.rapid7.com/metasploit/manage-meterpreter-and-shell-sessions/
https://www.hackingarticles.in/sessions-command-metasploit/
https://www.offensive-security.com/metasploit-unleashed/using-databases/
https://github.com/rapid7/metasploit-framework/wiki/How-to-get-started-with-writing-an-exploit