Book Image

Mastering Metasploit - Third Edition

By : Nipun Jaswal
Book Image

Mastering Metasploit - Third Edition

By: Nipun Jaswal

Overview of this book

We start by reminding you about the basic functionalities of Metasploit and its use in the most traditional ways. You’ll get to know about the basics of programming Metasploit modules as a refresher and then dive into carrying out exploitation as well building and porting exploits of various kinds in Metasploit. In the next section, you’ll develop the ability to perform testing on various services such as databases, Cloud environment, IoT, mobile, tablets, and similar more services. After this training, we jump into real-world sophisticated scenarios where performing penetration tests are a challenge. With real-life case studies, we take you on a journey through client-side attacks using Metasploit and various scripts built on the Metasploit framework. By the end of the book, you will be trained specifically on time-saving techniques using Metasploit.
Table of Contents (14 chapters)

Saving configurations in Metasploit

Most of the time, I forget to switch to the workspace I created for a particular scan and ended up merging results in the default workspace. However, such problems can be avoided using the save command in Metasploit. Suppose you have shifted the workspace and customized your prompts and other things. You can hit the save command to save the configuration. This means that next time you fire up Metasploit, you will land up with the same parameters and workspace you left behind, as shown in the following screenshot:

Let's fire up Metasploit and see if everything from our previous session got saved successfully or not:

Yup! Everything was collected in the configuration file. No more hassle in switching workspaces all the time from now on.