MSF-Remote-Console – A Remote Msfconsole To Connect To The Msfrcpd Server Of Metasploit

A far off msfconsole written in Python 2.7 to connect with the msfrcpd server of metasploit. This instrument will give you the facility to load modules completely as daemon in your server like autopwn2. Even if it will give you the facility to remotely use the msfrpcd server it is strongly recommended to make use of it in the community with a ssh or mosh shell as a result of certificates validation isn’t enabled.

  • Optimized supply & execution of instructions.
  • Has all msf instructions applied even long term ones. That is imaginable during the construction of the rpc api.
  • Flick thru your command historical past with the up and down arrow key.
  • Tab finishing touch for machine paths.
  • It appears like the standard msfconsole!

How does it seem like ?

[*] Connecting to server:
Host =>,
Port => 55553,
Consumer => msf,
Pwd => ***,
SSL => True

[+] Effectively hooked up
[*] Console identity: 19
, ,
(_) O O (_)_________
_ / |
o_o M S F |
_____ | *
||| WW|||
||| |||

=[ metasploit v4.12.22-dev-52b81f3 ]
+ -- --=[ 1577 exploits - 906 auxiliary - 272 post ]
+ -- --=[ 455 payloads - 39 encoders - 8 nops ]
+ -- --=[ Free Metasploit Pro trial: ]

msf >

How do I exploit it ?
Utilization: [options]

-h, --help display this assist message and go out
-r RESOURCE, --resource=RESOURCE
Trail to useful resource report
Username specified on msfrpcd
Password specified on msfrpcd
-s, --ssl Allow ssl
-P PORT, --port=PORT Port to connect with
-H HOST, --host=HOST Server ip
-c, --credentials Use hardcoded credentials
-e, --exit Go out after executing useful resource script

With the -c choice you’ll use the credentials hardcoded into be happy to switch them in order that you would not have to make use of the credential parameters always.
With the -r choice you specify a useful resource script to load out of your laptop into the console.

This will likely load a useful resource script and use the hardcoded credentials:

python -c -r /root/useful resource/handler/allHandlers.rc

This will likely log in to the msfrpcd server thru command line arguments:

python --ssl --port 55553 --host --user msf --pass msf

How do I set up it ?
First you will have to have metasploit put in. In case you cant use the installer as a result of you don’t have any graphical atmosphere or no matter use this information from rapid7: Environment Up a Metasploit Construction Setting This will likely set up all wanted dependencies:

git clone pymetasploit
cd pymetasploit && sudo python set up

Additionally do not omit to begin your msfrpcd server:

cd metasploit-framework/
ruby msfrpcd -U msf -P msf -p 55553

And its most likely a good suggestion to begin and hook up with the postgresql database: By means of the way in which trade the password within the echo line.

sudo replace-rc.d postgresql permit
sudo provider postgresql get started
echo "create database msf;create person msf with password 'password';grant all privileges on database msf to msf;" > createdb_sql.txt
sudo -u postgres /usr/bin/psql < /house/postgres/createdb_sql.txt

In Metasploit:

db_connect msf:[email protected]/msf

Author: Marshmallow

Marshmallow Android is BT Ireland’s Head of Sales for Republic of Ireland domestic multi-site companies, indigenous MNCs and public sector accounts. He is responsible for the direction and control of all sales activity in the region. He has over 10 years management experience from high growth start-ups to more established businesses. He’s led teams in Ireland, India and China across various industries (ICT, On-Line Recruitment, Corporate Training and International Education).