Skip to content

Metasploit Integration

xer0dayz edited this page Apr 30, 2022 · 4 revisions

To configure Sn1per to use the appropriate IP/port for reverse Metasploit connections, edit your /root/sniper.conf file or use a configuration template under /sniper/conf/ and replace the following values:

# METASPLOIT SCANNER CONFIG
MSF_LHOST="127.0.0.1"
MSF_LPORT="4444"
METASPLOIT_IMPORT="1"
METASPLOIT_EXPLOIT="1"
MSF_LEGACY_WEB_EXPLOITS="1"

This will configure Sn1per to set the LHOST and LPORT values for all exploits and payloads to connect back to the host specified.

In order to import data from NMap scan data into Metasploit's database (OPTIONAL), you will need to run the following commands to initialize the database:

msfdb init
systemctl start postgresql
msfconsole -x "db_status"

If you receive an error such as "[-] Failed to connect to the Postgres data service: SCRAM authentication requires libpq version 10 or above", see: https://github.com/rapid7/metasploit-framework/issues/16086