How to do it...

  1. First, we will use the show payloads command to display all compatible payloads:
  1. To get more information about a specific payload, we can use the info command followed by the payload name:
msf exploit(atutor_sqli) > info payload/generic/shell_bind_tcp        Name: Generic Command Shell, Bind TCP Inline     Module: payload/generic/shell_bind_tcp   Platform: All      ...Provided by:  skape <mmiller@hick.org>Basic options:Name   Current Setting  Required  Description----   ---------------  --------  -----------LPORT  4444             yes       The listen portRHOST                   no        The target addressDescription:  Listen for a connection and spawn a command shellmsf exploit(atutor_sqli) ...

Get Metasploit Penetration Testing Cookbook - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.