Skip to main content

metasploit_common_commands

msf5> use post/multi/recon/local_exploit_suggester

msf5> post(multi/recon/local_exploit_suggester) options

msf5> set session 1

msf5> run

Get back to active meterpreter session:

sessions $SESSION_NUMBER

#ex:
msf5> post(multi/recon/local_exploit_suggester) sessions 1

Put session in background:

meterpreter> background

search for exploits

msf5> post(multi/recon/local_exploit_suggester) search ms16-032