Hacking Tutorial Beginner to advanced - Metasploit (Lesson 2) - Basics#2

                            Examples


  • search

It it used to search anything you want in Metasploit.


Usage: search [<options>] [<keywords>]

If no options or keywords are provided, cached results are displayed.

OPTIONS:
  -h                Show this help information
  -o <file>         Send output to a file in csv format
  -S <string>       Search string for row filter
  -u                Use module if there is one result

Keywords:
  1. aka                              Modules with a matching AKA (also-known-as) name
  2. author                    Modules written by this author
  3. arch                           Modules affecting this architecture
  4. bid                               Modules with a matching Bugtraq ID
  5. cve                              Modules with a matching CVE ID
  6. edb                              Modules with a matching Exploit-DB ID
  7. check                       Modules that support the 'check' method
  8. date                             Modules with a matching disclosure date
  9. description       Modules with a matching description
  10. fullname               Modules with a matching full name
  11. mod_time           Modules with a matching modification date
  12. name                           Modules with a matching descriptive name
  13. path                              Modules with a matching path
  14. platform                Modules affecting this platform
  15. port                               Modules with a matching port
  16. rank                               Modules with a matching rank (Can be descriptive (ex: 'good') or                                                  numeric with   comparison operators (ex: 'gte400'))
  17. ref                                 Modules with a matching ref
  18. reference                       Modules with a matching reference
  19. target                             Modules affecting this target
  20. type                               Modules of a specific type (exploit, payload, auxiliary, encoder,                                                    evasion, post or nop)

Examples:
  > search name:windows type:exploit



  > search name:unix type:exploit

  
>search name:windows type:payload
 
 >search name:windows date:2019