Metasploit Framework

This skill should be used when the user asks to "use Metasploit for penetration testing", "exploit vulnerabilities with msfconsole", "create payloads with msfvenom", "perform post-exploitation", "use auxiliary modules for scanning", or "develop custom exploits". It provides comprehensive guidance for leveraging the Metasploit Framework in security assessments.

Author

zebbern

Category

Other Tools

Install

Hot:9

Download and extract to your skills directory

Copy command and send to OpenClaw for auto-install:

Download and install this skill https://openskills.cc/api/download?slug=sickn33-skills-metasploit-framework&locale=en&source=copy

Metasploit Framework - Professional Penetration Testing Framework

Skill Overview


Metasploit Framework is an open-source penetration testing framework that provides a complete security assessment toolkit—from vulnerability scanning and exploitation to post-exploitation activities. It helps security professionals manage exploit modules through a unified interface with msfconsole, generate various payloads using msfvenom, and perform efficient post-exploitation operations with Meterpreter.

Use Cases

1. Authorized Penetration Testing


When assessing target systems that have written authorization, use Metasploit’s exploit modules to validate the system’s security. Use auxiliary scanning modules to quickly identify open services, detect vulnerability versions, and use the check function to verify whether known vulnerabilities exist on the target.

2. Payload Generation and Delivery


Use msfvenom to generate customized payloads for different platforms (Windows, Linux, Android, and web applications). It supports multiple output formats (exe, elf, php, asp, war, etc.), and can use encoders to bypass basic security checks. Pair it with multi/handler to establish a reverse connection and receive sessions.

3. Post-Exploitation and Persistence


After obtaining initial access, use Meterpreter sessions to perform system information collection, credential extraction, privilege escalation, file transfer, and port forwarding. Use post modules for deeper enumeration and data collection, and establish a persistent access channel for subsequent testing.

Core Features

1. Modular Exploitation System


Metasploit provides more than 2000 exploit modules covering a wide range of platforms, including Windows SMB, Linux SSH, and web applications (Tomcat, Jenkins, WordPress). Use the search command to quickly locate modules. After selecting a module with use, configure parameters such as RHOSTS, RPORT, and PAYLOAD, and then run the exploit.

2. Flexible Payload Generation


The msfvenom tool supports generating three types of payloads: Singles (standalone), Stagers (staged), and Stages (full functionality). It offers various payload types such as Meterpreter, shell, and VNC. You can combine encoders (e.g., shikata_ga_nai) and multiple rounds of encoding to evade signature-based detection, and it supports dozens of output formats to fit different delivery scenarios.

3. Meterpreter Post-Exploitation Framework


Meterpreter provides an in-memory interactive shell, supporting system operations such as sysinfo, getuid, and getsystem. It also supports credential collection like hashdump and keyscan, file transfers via upload/download, process migration with migrate, and port forwarding with portfwd as well as route pivoting through routing capabilities. You can invoke rich post-exploitation modules using commands such as run post/.

Common Questions

What systems can Metasploit run on?


Metasploit Framework natively supports Linux (recommended: Kali Linux), macOS, and Windows. Kali Linux includes the full version preinstalled; other systems can deploy it using the official installation scripts. Using a PostgreSQL database allows storage of scan results and session information, improving management efficiency.

How can a Meterpreter session be restored after it disconnects?


If a session disconnects due to network instability or the termination of the target process, you can use sessions -l to view the history of sessions and then use sessions -i [number] to attempt reconnection. It is recommended to run migrate immediately after obtaining a session to move to a stable process (e.g., explorer.exe), or use the persistence module to establish persistent access.

What legal restrictions apply when using Metasploit?


Metasploit may only be used for security testing of systems you own or for systems you have obtained explicit written authorization to test. Unauthorized use constitutes illegal intrusion and may result in legal liability. Before use, confirm the test scope, rules, and authorization documents. All findings should be reported only to the authorized party and must not be used for malicious purposes or to disclose information about test targets.