Platform
Explore
PLATFORM
Platform
ELITE TECHNOLOGY
AI-Engine
INTELLIGENT TOOLS
Rapid7 Labs
TRUSTED INTELLIGENCE
SOLUTIONS
Managed Threat Complete
MANAGED XDR
Surface Command
ATTACK SURFACE MANAGEMENT
Exposure Command
EXPOSURE MANAGEMENT
Products
Request Demo
DETECTION & RESPONSE
Next-Gen SIEM
INSIGHTIDR
Threat Intelligence
THREAT COMMAND
EXPOSURE MANAGEMENT
Exposure Management
EXPOSURE COMMAND
Attack Surface Management
SURFACE COMMAND
Vulnerability Management
INSIGHTVM
Cloud-Native Application Protection
INSIGHTCLOUDSEC
Application Security Testing
INSIGHTAPPSEC
Services
Request Demo
DETECTION & RESPONSE
Managed XDR
MANAGED THREAT COMPLETE
Incident Response Services
EXPERIENCING A BREACH?
EXPOSURE MANAGEMENT
Managed Vulnerability Management
OPTIMIZED RISK ASSESSMENT
Managed Application Security
MANAGED DAST
Continuous Red Teaming
VECTOR COMMAND
Penetration Testing Services
TEST YOUR DEFENSES
Resources
READ NOW
STAY CURRENT
About Rapid7 Labs
MEET THE RESEARCH TEAM
Events & Webinars
CATCH US LIVE
Resources Library
DIVE INTO THE DETAILS
The Rapid7 Blog
STAY UP-TO-DATE
Exploit Database
SEARCH THOUSANDS OF CVES
Cybersecurity Fundamentals
LEARN THE BASICS
PRODUCT SUPPORT
Contact Sales
TALK TO AN EXPERT
Customer Support Portal
CONTACT SUPPORT
Product Integrations
CONNECT EVERYTHING
Product Documentation
PRODUCT AND SERVICES GUIDES
Product Release Notes
LATEST FEATURES
Company
OVERVIEW
About Us
OUR STORY
Leadership
EXECUTIVE TEAM & BOARD
News & Press Releases
THE LATEST FROM OUR NEWSROOM
Careers
JOIN RAPID7
Our Customers
Their Success Stories
Partners
Rapid7 Partner Ecosystem
Investors
Investor Relations
COMMUNITY & CULTURE
Social Good
OUR COMMITMENT & APPROACH
Rapid7 Cybersecurity Foundation
BUILDING THE FUTURE
Diversity, Equity & Inclusion
EMPOWERING PEOPLE
Open Source
STRENGTHENING CYBERSECURITY
Public Policy
ENGAGEMENT & ADVOCACY
Boston Bruins
Our Partnership
Partners
Sign In
Documentation
Metasploit
AppSpider
Insight Agent
InsightAppSec
InsightCloudSec
InsightConnect
Insight Platform
InsightIDR
Insight Network Sensor
InsightOps
InsightVM
Metasploit
Nexpose
tCell
Managed Services
Threat Command
Platform
Explore
PLATFORM
Platform
ELITE TECHNOLOGY
AI-Engine
INTELLIGENT TOOLS
Rapid7 Labs
TRUSTED INTELLIGENCE
SOLUTIONS
Managed Threat Complete
MANAGED XDR
Surface Command
ATTACK SURFACE MANAGEMENT
Exposure Command
EXPOSURE MANAGEMENT
Products
Request Demo
DETECTION & RESPONSE
Next-Gen SIEM
INSIGHTIDR
Threat Intelligence
THREAT COMMAND
EXPOSURE MANAGEMENT
Exposure Management
EXPOSURE COMMAND
Attack Surface Management
SURFACE COMMAND
Vulnerability Management
INSIGHTVM
Cloud-Native Application Protection
INSIGHTCLOUDSEC
Application Security Testing
INSIGHTAPPSEC
Services
Request Demo
DETECTION & RESPONSE
Managed XDR
MANAGED THREAT COMPLETE
Incident Response Services
EXPERIENCING A BREACH?
EXPOSURE MANAGEMENT
Managed Vulnerability Management
OPTIMIZED RISK ASSESSMENT
Managed Application Security
MANAGED DAST
Continuous Red Teaming
VECTOR COMMAND
Penetration Testing Services
TEST YOUR DEFENSES
Resources
READ NOW
STAY CURRENT
About Rapid7 Labs
MEET THE RESEARCH TEAM
Events & Webinars
CATCH US LIVE
Resources Library
DIVE INTO THE DETAILS
The Rapid7 Blog
STAY UP-TO-DATE
Exploit Database
SEARCH THOUSANDS OF CVES
Cybersecurity Fundamentals
LEARN THE BASICS
PRODUCT SUPPORT
Contact Sales
TALK TO AN EXPERT
Customer Support Portal
CONTACT SUPPORT
Product Integrations
CONNECT EVERYTHING
Product Documentation
PRODUCT AND SERVICES GUIDES
Product Release Notes
LATEST FEATURES
Company
OVERVIEW
About Us
OUR STORY
Leadership
EXECUTIVE TEAM & BOARD
News & Press Releases
THE LATEST FROM OUR NEWSROOM
Careers
JOIN RAPID7
Our Customers
Their Success Stories
Partners
Rapid7 Partner Ecosystem
Investors
Investor Relations
COMMUNITY & CULTURE
Social Good
OUR COMMITMENT & APPROACH
Rapid7 Cybersecurity Foundation
BUILDING THE FUTURE
Diversity, Equity & Inclusion
EMPOWERING PEOPLE
Open Source
STRENGTHENING CYBERSECURITY
Public Policy
ENGAGEMENT & ADVOCACY
Boston Bruins
Our Partnership
Partners
Sign In
Documentation
Metasploit
AppSpider
Insight Agent
InsightAppSec
InsightCloudSec
InsightConnect
Insight Platform
InsightIDR
Insight Network Sensor
InsightOps
InsightVM
Metasploit
Nexpose
tCell
Managed Services
Threat Command
Release Notes
Docs Menu
Welcome
Quick Start Guide
Getting Started
Metasploit Basics
What is Penetration Testing?
Glossary
Keyboard Shortcuts
Getting Support
Submitting a Request for Enhancement
Rapid7's End of Life Policy
Installing Metasploit
Installing Metasploit Pro
System Requirements
Setting Up a Vulnerable Target
Metasploitable 2
Metasploitable 2 Exploitability Guide
Discovery
Discovery Scan
Importing Data
Importing Project Sonar
Vulnerability Scanning with Nexpose
Tracking Real-Time Statistics and Events
Validate Vulnerabilities
Validating a Vulnerability
Working with the Vulnerability Validation Wizard
Validating Vulnerabilities Discovered by Nexpose
Sharing Validation Results with Nexpose
Exploitation
Listener
Using Exploits
Skipping Fragile Devices
Payloads
Working with Payloads
The Payload Generator
Post-exploitation
About Post-Exploitation
Manage Meterpreter and Shell Sessions
Meterpreter getsystem
Credentials
Understanding Credentials
Managing Credentials
Reusing Credentials
Searching Credentials
Bruteforce Attacks
Understanding Bruteforce Findings
Social Engineering
About Social Engineering
Create a New Campaign
Create a Custom Campaign
Managing Campaigns
Review Your Findings
Managing Target Lists
Uploading Custom SSL Certificates
Modifying the SSL Cipher for Web Servers
Best Practices for Social Engineering
Automating Tasks
About Task Chains
Create a Task Chain
Managing and Editing Task Chains
Scheduling Task Chains
Resource Scripts
Reporting
About Reports
Activity Report
Audit Report
Collected Evidence Report
Compromised and Vulnerable Hosts Report
Credentials Report
FISMA Compliance Report
PCI Compliance Report
Social Engineering Campaign Details Report
Services Report
Customizing Standard Reports
Working with Custom Templates
About MetaModule Reports
Credentials Domino MetaModule Report
Known Credentials Intrusion Report
Single Password Testing MetaModule Report
SSH Key Testing MetaModule Report
Pass the Hash Report
Logs
Accessing Logs
Rotating Logs
Exporting Logs
Find Recently Changed Logs
MetaModules
Credentials Domino MetaModule
Understanding the Credentials Domino MetaModule Findings
Single Credential Testing MetaModule
SSH Key Testing MetaModule
Known Credentials Intrusion MetaModule
Segmentation and Firewall Testing MetaModule
Tutorials
Passing the Hash Tutorial
Testing a Single Credential Tutorial
Credentials Tutorial
Metasploit Pro Web Interface
Using the Metasploit Web Interface
The Projects Page
The Analysis Page
The Sessions Page
The Campaign Page
The Modules Page
The Tasks Page
The Administration Page
Managing Projects
Creating and Managing Projects
Exporting Project Data
Team Collaboration
Hosts
Managing Hosts
Managing and Updating Metasploit
Managing User Accounts
Managing License Keys
Verifying Downloads with SHA-1 Hashes
Backing Up and Restoring Metasploit Data
Notification Center
Updating Metasploit
Restarting Metasploit Services
Uninstalling Metasploit
Replacing the SSL Certificate
Set Up a Global SMTP Server
Reset Username and Password
Pro Console
About the Pro Console
Auto-Exploitation
Exporting and Importing Data
Managing Credentials
Managing the Database from the Pro Console
Managing Notes
Managing Tasks
Managing Vulnerabilities
Manual Exploitation
Managing Metasploit
Working with Projects
Pro Console Reports
Scanning and Managing Hosts
Troubleshooting
Unable to Connect
Does Pro include Framework as well?
How Are Logins Created?
Project Report Taking a Long Time
Exploit Has Been Running for a Long Time
Installation Troubleshooting
Download fails at x% error
Anti-virus Interrupts Installation
Metasploit service can"t bind to port 3790
“Metasploit is initializing” error
Metasploit Pro Free Trial
Invalid Email/ Domain
Register Without Internet Connection
Activation Failed Error
Prohibited Countries
Set the lhost in Metasploit
Update Troubleshooting
Incremental Updates
Items Displaying Incorrectly After Update
Installation failed: Signature failure Error
Failed to Update
Administration Troubleshooting
Support for 32-bit Operating Systems
Use Meterpreter Locally Without an Exploit
Issue Restarting on Windows Due to RangeError
Where Is the Activity Log?
Logs and Reports after Metasploit 4.9
Why Can"t I Add a New User?
Database Troubleshooting
No Database Connection
Automatically Connect the Database
Postgres Unable to Connect
Payloads Troubleshooting
Encoded Payloads Don"t Bypass Anti-virus
Getsystem Command
Social Engineering Troubleshooting
Frequently Asked Questions
Social Engineering Campaigns Report Image Broken
Social Engineering Campaign Not Working
Server Is Not Sending Emails
Social Engineering Campaign Taking a Long Time
Nexpose Troubleshooting
Nexpose host is unreachable
Authentication required for API access
Nexpose Scan Blackout
Scans Are Not Importing
Bruteforce Attacks Troubleshooting
What Happens When a Credential Fails?
Bruteforce Attack Is Not Working
Metasploit Framework
Metasploit Framework
Installing the Metasploit Framework
Managing the Database
Managing Workspaces
Modules
Running Metasploit Remotely
Tagging Hosts in msfconsole
Using APIs
Standard API Methods
Standard API Methods Reference
Pro API Methods Reference
Pro General API
Pro License API
Pro Updates API
Pro Task API
Pro Feature API
Pro Import API
Pro Loot API
Pro Module API
REST API
REST API Endpoints
RPC API
Sample Usage of the RPC API
Release Notes
Metasploit release notes
Welcome
Quick Start Guide
Getting Started
Metasploit Basics
What is Penetration Testing?
Glossary
Keyboard Shortcuts
Getting Support
Submitting a Request for Enhancement
Rapid7's End of Life Policy
Installing Metasploit
Installing Metasploit Pro
System Requirements
Setting Up a Vulnerable Target
Metasploitable 2
Metasploitable 2 Exploitability Guide
Discovery
Discovery Scan
Importing Data
Importing Project Sonar
Vulnerability Scanning with Nexpose
Tracking Real-Time Statistics and Events
Validate Vulnerabilities
Validating a Vulnerability
Working with the Vulnerability Validation Wizard
Validating Vulnerabilities Discovered by Nexpose
Sharing Validation Results with Nexpose
Exploitation
Listener
Using Exploits
Skipping Fragile Devices
Payloads
Working with Payloads
The Payload Generator
Post-exploitation
About Post-Exploitation
Manage Meterpreter and Shell Sessions
Meterpreter getsystem
Credentials
Understanding Credentials
Managing Credentials
Reusing Credentials
Searching Credentials
Bruteforce Attacks
Understanding Bruteforce Findings
Social Engineering
About Social Engineering
Create a New Campaign
Create a Custom Campaign
Managing Campaigns
Review Your Findings
Managing Target Lists
Uploading Custom SSL Certificates
Modifying the SSL Cipher for Web Servers
Best Practices for Social Engineering
Automating Tasks
About Task Chains
Create a Task Chain
Managing and Editing Task Chains
Scheduling Task Chains
Resource Scripts
Reporting
About Reports
Activity Report
Audit Report
Collected Evidence Report
Compromised and Vulnerable Hosts Report
Credentials Report
FISMA Compliance Report
PCI Compliance Report
Social Engineering Campaign Details Report
Services Report
Customizing Standard Reports
Working with Custom Templates
About MetaModule Reports
Credentials Domino MetaModule Report
Known Credentials Intrusion Report
Single Password Testing MetaModule Report
SSH Key Testing MetaModule Report
Pass the Hash Report
Logs
Accessing Logs
Rotating Logs
Exporting Logs
Find Recently Changed Logs
MetaModules
Credentials Domino MetaModule
Understanding the Credentials Domino MetaModule Findings
Single Credential Testing MetaModule
SSH Key Testing MetaModule
Known Credentials Intrusion MetaModule
Segmentation and Firewall Testing MetaModule
Tutorials
Passing the Hash Tutorial
Testing a Single Credential Tutorial
Credentials Tutorial
Metasploit Pro Web Interface
Using the Metasploit Web Interface
The Projects Page
The Analysis Page
The Sessions Page
The Campaign Page
The Modules Page
The Tasks Page
The Administration Page
Managing Projects
Creating and Managing Projects
Exporting Project Data
Team Collaboration
Hosts
Managing Hosts
Managing and Updating Metasploit
Managing User Accounts
Managing License Keys
Verifying Downloads with SHA-1 Hashes
Backing Up and Restoring Metasploit Data
Notification Center
Updating Metasploit
Restarting Metasploit Services
Uninstalling Metasploit
Replacing the SSL Certificate
Set Up a Global SMTP Server
Reset Username and Password
Pro Console
About the Pro Console
Auto-Exploitation
Exporting and Importing Data
Managing Credentials
Managing the Database from the Pro Console
Managing Notes
Managing Tasks
Managing Vulnerabilities
Manual Exploitation
Managing Metasploit
Working with Projects
Pro Console Reports
Scanning and Managing Hosts
Troubleshooting
Unable to Connect
Does Pro include Framework as well?
How Are Logins Created?
Project Report Taking a Long Time
Exploit Has Been Running for a Long Time
Installation Troubleshooting
Download fails at x% error
Anti-virus Interrupts Installation
Metasploit service can"t bind to port 3790
“Metasploit is initializing” error
Metasploit Pro Free Trial
Invalid Email/ Domain
Register Without Internet Connection
Activation Failed Error
Prohibited Countries
Set the lhost in Metasploit
Update Troubleshooting
Incremental Updates
Items Displaying Incorrectly After Update
Installation failed: Signature failure Error
Failed to Update
Administration Troubleshooting
Support for 32-bit Operating Systems
Use Meterpreter Locally Without an Exploit
Issue Restarting on Windows Due to RangeError
Where Is the Activity Log?
Logs and Reports after Metasploit 4.9
Why Can"t I Add a New User?
Database Troubleshooting
No Database Connection
Automatically Connect the Database
Postgres Unable to Connect
Payloads Troubleshooting
Encoded Payloads Don"t Bypass Anti-virus
Getsystem Command
Social Engineering Troubleshooting
Frequently Asked Questions
Social Engineering Campaigns Report Image Broken
Social Engineering Campaign Not Working
Server Is Not Sending Emails
Social Engineering Campaign Taking a Long Time
Nexpose Troubleshooting
Nexpose host is unreachable
Authentication required for API access
Nexpose Scan Blackout
Scans Are Not Importing
Bruteforce Attacks Troubleshooting
What Happens When a Credential Fails?
Bruteforce Attack Is Not Working
Metasploit Framework
Metasploit Framework
Installing the Metasploit Framework
Managing the Database
Managing Workspaces
Modules
Running Metasploit Remotely
Tagging Hosts in msfconsole
Using APIs
Standard API Methods
Standard API Methods Reference
Pro API Methods Reference
Pro General API
Pro License API
Pro Updates API
Pro Task API
Pro Feature API
Pro Import API
Pro Loot API
Pro Module API
REST API
REST API Endpoints
RPC API
Sample Usage of the RPC API
Release Notes
Metasploit release notes
Rapid7's End of Life Policy
For more information on Rapid7's end of life policy, please read this
PDF
.
Did this page help you?
Yes
No
Welcome
Submitting a Request for Enhancement
Installing Metasploit
Installing Metasploit Pro