Metasploit DB Usage


Security Analyst @ Capgemini

  Please Don't Expect

  • How to Evade Firewalls & Antivirus
  • How to do Privilege Escalation
  • How to do Pivoting & Port Forwarding
  • How to do Post Exploitation etc..,


  • Metasploit Basics
  • Initial Setup & Workspaces Configurations
  • Importing & Exporting Scan Results
  • Hosts & Services
  • Setting up Modules
  • CSV Export
  • Creds & Loot.

Metasploit Basics


Not Just a Tool

An Entire Framework for Automating various tasks for Penetration Testing / Attacking

Metasploit Filesystem

MSF File Architecture

  • Data: editable files used by Metasploit.
  • Documentation: provides documentation for the framework.
  • External: source code and third-party libraries.
  • Lib: the 'meat' of the framework code base.
  • Modules: the actual MSF modules.
  • Plugins: plugins that can be loaded at run-time.

Metasploit Basics

Metasploit Modules

Metasploit Interfaces

  • Exploits
  • Auxiliary
  • Payloads
  • Encoders
  • Nops
  • MSF CLI (Discontinued)
  • MSF WEB (Discontinued)
  • Metasploit Pro

Metasploit Modules

Exploits - Modules used for actually attacking the systems and grabbing the access.


Auxiliary - Exploit without payload. Used for scanning,Fuzzing & doing various tasks.


Payloads - A piece of code which executes on remote system after successful exploitation.


Encoders - Program which encodes our payload to avoid antivirus detection.


Nops - Used to keep payload size consistent.

Metasploit Interfaces - MSFCONSOLE

Metasploit Interfaces - MSFCLI

Metasploit Interfaces - Armitage

Note: Metasploit Community & Pro Editions are removed from Kali

Metasploit DB

Why should I use it?

I don't know how to keep track of all my works?


I get confused with Metasploit while working with multiple projects?


I want to import & export results and keep it organized?

  • Open source relational database management system (DBMS ) developed by a worldwide team of volunteers.

  • PostgreSQL is not controlled by any corporation or other private entity and the source code is available free of charge.

Metasploit Database

Metasploit keeps track of everything you have done to the target network within its database.

MSF Database Cmd's

DB Workspaces

Useful to Organize our works in the form of workspaces.


Demo Setup

Kali Linux 2.0

MSF Workspaces 

  • Using Workspaces
  • Importing - Nmap Scan Results
  • Scanning - Using db_nmap
  • Exporting - Workspace Results



Demo 1 !!!

Hosts & Services



  • -a Add
  • -d delete
  • -c Columns
  • -u Up
  • -o Output
  • -R Rhosts
  • -S Search

Available columns: address, arch, comm, comments, created_at, info, mac, name, note_count, os_flavor, os_lang, os_name, os_sp, purpose, scope, service_count, state, updated_at, virtual_host, vuln_count

Available columns: created_at, info, name, port, proto, state, updated_at

Demo 2 !!!

Creds & Loot

The ‘creds’ command is used to manage found and used credentials for targets in our database. Running this command without any options will display currently saved credentials.

In the event of a successful hash dump, this information will be stored in our database. We can view this dumps using the ‘loot’ command.



Demo 3 !!!