Show / Show Module Options
Show Module Options
Displays the configuration options available for the selected module in Metasploit.
show options show options #!/bin/bash
# Show Module Options
show options import subprocess
# Show Module Options
# Make sure to replace <placeholders> with actual values
def run_command():
cmd = [
"show",
"options"
]
try:
print(f"Executing: {' '.join(cmd)}")
subprocess.run(cmd, check=True)
except subprocess.CalledProcessError as e:
print(f"Error: {e}")
except FileNotFoundError:
print("Error: show not found. Please install it first.")
if __name__ == "__main__":
run_command() When To Use
When preparing to execute a module to ensure all parameters are properly set.
Pro Tip
Pay close attention to dependencies among options; incorrect combinations can lead to module failures.
Anatomy of Output
Understanding the result
Module Options: Options Overview Displays all configurable parameters for the selected module.
RHOSTS => Set the target hosts for the attack. RHOSTS Option Essential for defining where the attack targets are located.
PAYLOAD => The payload to be delivered. PAYLOAD Option Must correspond with the attack type being executed.
Troubleshooting
Common pitfalls
[-] No module currently selected; use 'use' to select a module.
Solution: Select a module before attempting to show options.
[ERROR] Unable to retrieve options; module may not be accessible.
Solution: Check whether the selected module exists and is properly installed.
[-] Invalid command: 'show options 123'.
Solution: 'show options' should be used without additional arguments.
Command Breakdown
What each part is doing
-
show - Base Command
- The executable that performs this operation. Here it runs Show before the shell applies any redirect operators.
Alternative Approaches
Comparable commands in other tools
Alternative security tools for the same job.
nettacker --ping-before-scan -m <port_scan,subdomain_scan,waf_scan,...> -g <80,443> -i <owasp.org> Gpg / Display Help In Gpg Tui <?> Freshclam / Update Virus Definitions Clamav freshclam Secret Tool / Retrieve Password secret-tool lookup key <key> John / Show Passwords Cracked john --show <path/to/hashes.txt>