Skip to Content
MetasploitThe Administration Page

The Administration Page

The Administration page is where you will manage software updates, users, and global settings.

You can access the following sections from Administration:

To access Administration in Metasploit Pro, click Administration in the upper right.

the-administration-page1.png

Software Updates

Any time a new version of Metasploit Pro is released or you want to check for updates, you can do this from the “Software Updates” screen.

the-administration-page2.png

License Details

  • Product Key - The current product key for Metasploit Pro.
  • Product Edition - The version of Metasploit you are using.
  • Registered To - The original email address used to register Metasploit Pro.
  • Licensed Until - The date and time the product key will expire. This field also includes a countdown for the number of days remaining.

Product Updates

  • **Use an HTTP Proxy to reach the internet?*8 - This will open settings for you to configure if you need to use a HTTP Proxy to reach the internet.
  • Check for Updates - Check for any new updates to Metasploit Pro.
  • Received an Offline Update File? -After clicking the link, follow the instructions to update using a file.

User Administration

User Administration is where you add, remove, or change the access level of users.

the-administration-page3.png
  • Username - The username
  • Project Access - What projects a user has access to. If a user is an Admin, they will have access to all projects, regardless of what is selected when creating a project.
  • Role - If the user is an Admin or User
    • Admin - Has access to all projects
    • User - Has access to only selected projects
  • Full Name - Users full name
  • Email - Users email

Software License

The Software License screen is where you can see the number of allowed users, activate a new license, or request a new license.

the-administration-page4.png

License Details

  • Product Key - The current product key for Metasploit Pro.
  • Product Edition - The version of Metasploit you are using. The number of users the product allows.
  • Registered To - The original email address used to register Metasploit Pro.
  • Licensed Until - The date and time the product key will expire. This field also includes a countdown for the number of days remaining.

Request New License

Follow the steps to contact support for a new license key if needed.

Change License

  • Enter a new product key to activate the license
  • Use an HTTP Proxy to reach the internet? - This will open settings for you to configure if you need to use a HTTP Proxy to reach the internet.
  • Offline Activation - After clicking the link, follow the instructions to update using a file.

Global Settings

The Global Settings screen is where you can manage system wide settings. These will not override project level settings.

Global Settings

the-administration-page5.png
  • Value - Toggle to turn the setting on or off.
  • Category - What the setting controls.
  • Setting - Name of the setting.
  • Description -What the setting does.

SMTP Settings

Configure global email settings. For social engineering campaigns, the information will automatically populate in the email fields.

the-administration-page6.png
  • Address - he fully qualified mail server address (for example, mail.domain.com).
  • **Port - The **port that the server uses.
  • **Use SSL? - **Enable SSL for emails.
  • Domain - The hosted domain name for your mail server (for example, domain.com).
  • Username - Login username for the server.
  • **Password **- Password for the server.
  • Authentication - The type of authentication your server requires.
    • plain - The authentication is sent as Base64 encoded. SSL is recommended with this authentication type.
    • Login - The server asks for the username and password as Base64 encoded and the response is sent as Base64 encoded. SSL is recommended with this authentication type.
    • cram_md5 - Challenge and response authentication.

API Keys

Create and manage API keys. To learn more about the Metasploit API, see Standard API Methods Reference.

the-administration-page7.png
  • **Name - The **name given when the API key was created.
  • **Authentication Token **- Refers to the API token itself. To see the full text, click on the token link.
  • Issue Date - The date the API token was created.

Post-Exploitation Macros

When a vulnerability is successfully exploited, run a module in an open session. You can run one or more modules at a time.

the-administration-page8.png
  • Name - The name of the macro. User created.
  • Description - The description of the macro. User created.
  • Actions - The number of actions or steps the macro takes.
  • Author - The user that created the macro.
  • Updated - The date and time the macro using yyyy-mm-dd hr:mm:ss -timezone. For example, 2019-11-19 10:31:32 -0600.

Persistent Listeners

A listener is a way back into an exploited system. Instead of needing to go through all the exploit steps again, a listener provides a “backdoor”.

the-administration-page9.png
  • Scope - The listener address and port.
  • Project - The project the listener is used on.
  • Owner - The creator of the listener.
  • Payload - The payload type
  • Macro - If selected, the macro the payload will attempt to run.
  • Enabled - If the listeners is enabled.
  • Status - The state of the listener:
    • Active
    • Inactive
  • Updated - The last updated date using yyyy-mm-dd hr:mm:ss -timezone. For example, 2019-11-19 10:31:32 -0600.

Nexpose Consoles

Use Nexpose to import data for vulnerability scanning and analysis.

the-administration-page10.png
  • Name - The Nexpose console name. User created.
  • Address - The IP or server address with the port for the Nexpose Security Console.
  • Status - The status of the Nexpose Security Console. It will indicate if the console is connected or experiencing issues.
  • Version - The software version of the Security Console.
  • Sites - The collection of assets targeted for a scan.
  • Creator - The user that created the Nexpose console import.
  • Updated - The last updated date using “yyyy-mm-dd hr:mm:ss -timezone. For example, 2019-11-19 10:31:32 -0600`.

Stop All Tasks

Stop every running task.

the-administration-page11.png

Backups

Create and store backups of projects.

the-administration-page12.png
  • File - The backup name. User generated.
  • Description - The backup description. User generated.
  • Date - The date created using yyyy-mm-dd hr:mm:ss -timezone. For example, 2019-11-19 10:31:32 -0600.
  • **Metasploit Version - The **Metasploit version the backup is based on.
  • Compressed Size - The size of the backup file after compression takes place.
  • Restored Size -The size of the backup file when it is restored.
  • Status -The backup status
  • Restore - Click to restore the project to the backup.