Land #18412, Add a couple tips to metasploit

This commit is contained in:
Jack Heysel 2023-10-04 13:45:33 -04:00
commit 81e4f94869
No known key found for this signature in database
GPG Key ID: D373F2C24A2A1E70
1 changed files with 4 additions and 2 deletions

View File

@ -32,13 +32,15 @@ module Msf
"Search can apply complex filters such as #{highlight('search cve:2009 type:exploit')}, see all the filters with #{highlight('help search')}",
"Metasploit can be configured at startup, see #{highlight('msfconsole --help')} to learn more",
"Display the Framework log using the #{highlight('log')} command, learn more with #{highlight('help log')}",
"Adapter names can be used for IP params #{highlight('set LHOST eth0')}",
"Network adapter names can be used for IP options #{highlight('set LHOST eth0')}",
"Use #{highlight('sessions -1')} to interact with the last opened session",
"View missing module options with #{highlight('show missing')}",
"Start commands with a space to avoid saving them to history",
"You can pivot connections over sessions started with the ssh_login modules",
"Use the #{highlight('analyze')} command to suggest runnable modules for hosts",
"Set the current module's RHOSTS with database values using #{highlight('hosts -R')} or #{highlight('services -R')}"
"Set the current module's RHOSTS with database values using #{highlight('hosts -R')} or #{highlight('services -R')}",
"Use the 'capture' plugin to start multiple authentication-capturing and poisoning services",
"The #{highlight('use')} command supports fuzzy searching to try and select the intended module, e.g. #{highlight('use kerberos/get_ticket')} or #{highlight('use kerberos forge silver ticket')}"
].freeze
private_constant :COMMON_TIPS