Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
The next step in configuring Metasploit is initializing and launching the postgresql database. As mentioned in a previous video, the Metasploit database is used to save info associated with Metasploit operations such as scans and exploits. Dean demonstrates how to start up the postgresql database from the Kali command line interface (CLI). It runs as a background process. He then demonstrates how to verify that the database is connected and how to execute the help command to examine the various database options.