Part 3 - Metasploit Database

Video Activity

The next step in configuring Metasploit is initializing and launching the postgresql database. As mentioned in a previous video, the Metasploit database is used to save info associated with Metasploit operations such as scans and exploits. Dean demonstrates how to start up the postgresql database from the Kali command line interface (CLI). It runs ...

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
5 hours 38 minutes
Difficulty
Intermediate
CEU/CPE
6
Video Description

The next step in configuring Metasploit is initializing and launching the postgresql database. As mentioned in a previous video, the Metasploit database is used to save info associated with Metasploit operations such as scans and exploits. Dean demonstrates how to start up the postgresql database from the Kali command line interface (CLI). It runs as a background process. He then demonstrates how to verify that the database is connected and how to execute the help command to examine the various database options.

Video Transcription
00:05
>> Now we'll do a little bit more exploring
00:05
of the fundamentals of Metasploit.
00:05
One of the things to remember right after that is
00:05
if you wish to save
00:05
information within your database
00:05
that's connected to a Metasploit,
00:05
then you need to do a few things.
00:05
One of them is to actually start up
00:05
>> the Postgres Service.
00:05
>> As root, I'm going to run service Postgres SQL.
00:05
I'm not sure how you want to pronounce that
00:05
>> and then we'll go ahead and start this up.
00:05
>> This will get the database running in the background
00:05
>> so that when we start our MSF console,
00:05
>> we'll be able to verify
00:05
that were connected to the database,
00:05
and that way when we capture
00:05
information from hosts or from scans or from
00:05
other activity it will be saved in
00:05
the database for later retrieval.
00:05
It will explore a little bit about some of
00:05
the capabilities of the database as far
00:05
as adding and removing information.
00:05
I see that my database has started.
00:05
I have a couple of options here.
00:05
One thing I can do is I can run
00:05
the Metasploit framework from
00:05
this nice little M shield icon here.
00:05
This will open up a separate shell.
00:05
It says a database is already configured,
00:05
so I don't need to do that step.
00:05
The first time you run Metasploit,
00:05
you would do have to run a DB Init command
00:05
and you'll notice that you get a nice little banner
00:05
every time you start Metasploit.
00:05
In fact, you can just type
00:05
the banner command again
00:05
>> if you want to just see some of the other options
00:05
>> that are out there.
00:05
>> There's, some of these are kind of humorous,
00:05
a little bit entertaining.
00:05
But anyway, I'm going to run my Help command,
00:05
and Help command gives me
00:05
a nice collection of all the different things I can do.
00:05
As we get through various portions of the course,
00:05
we'll get to explore more
00:05
>> and more of these possible options.
00:05
>> As I was starting to say,
00:05
if this is your first time running Metasploit
00:05
then you'll notice
00:05
we have some database commands here.
00:05
I've already set up my database
00:05
and we'll take a peek of what's involved there.
Up Next