Imports

nmap

Step 1: Run Nmap to Save Results

nmap -Pn -sV -O -oX nmap-msf.xml demo.ine.local

Step 2: Start Metasploit Famework & Create a Workspace (Optional)

# Start Postgres
service postgresql start

# Start Metasploit
msfconsole
db_status

# When db_status says [*] postgresql selected, no connection
msfdb delete
msfdb init
cp /usr/share/metasploit-framework/config/database.yml /root/.msf6
service postgresql start
msfconsole
db_status

# Workspace
workspace
workspace -a name_of_workspace

Step 3: Import Nmap Result

db_import nmap-msf.xml

Step 4: View Hosts & Services

hosts
services

Step 5: Run nmap directly from MSF

db_nmap -Pn -sS -O -p- [IP]

Nessus

Step 1: Export the scan results as a .nessus file (XML format).

Step 2: Import nessus results

msfconsole -q
workspace -a msf-nessus
db_import /path/to/nessus.nessus

Step 3: View Hosts & Services

hosts
services

Step 4: View Vulnerabilities & Search CVEs

vulns
vulns -p [port]
search cve:[year] name:[name]

Last updated