Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/docker/README.md
Views: 11704
Folder Purpose
This folder contains files related to running Metasploit inside Docker.
Metasploit in Docker
Getting Started
To run msfconsole
or
To run msfvenom
or
You can pass any command line arguments to the binstubs or the docker-compose command and they will be passed to msfconsole
or msfvenom
. If you need to rebuild an image (for example when the Gemfile changes) you need to build the docker image using docker-compose build
or supply the --rebuild
parameter to the binstubs.
But I want reverse shells...
By default we expose port 4444
.
If you want to expose more ports, or have LHOST
prepopulated with a specific value; you'll need to setup a local docker-compose override for this.
Create docker-compose.local.override.yml
with:
Make sure you set LHOST
to valid hostname that resolves to your host machine.
Now you need to set the COMPOSE_FILE
environment variable to load your local override.
Now you should be able get reverse shells working