Skip to Content

Ethical Hacking: How Do You Display and Configure Module’s Required Options in MSFConsole?

What Is the Difference Between ‘show options’ and ‘info’ in Metasploit?

Learn how to use the show options command in msfconsole to view the required and optional parameters for any selected module. Understand how this command is essential for configuring an exploit or auxiliary module before execution.

Question

Which command in msfconsole shows the details of options required for a selected module?

A. run
B. show options
C. help
D. info

Answer

B. show options

Explanation

show options lists configurable parameters for a selected module.

The show options command is used within msfconsole to display all the configurable parameters for the currently loaded module. After selecting a module with the use command, show options presents a table that lists each parameter’s name (e.g., RHOSTS, LPORT), its current setting, whether it is required (yes or no), and a brief description of its purpose. This is the primary command used during the configuration phase of an attack to set target details and payload handlers before executing the module.

The other options have distinct functions:

A. run: This command, along with its alias exploit, executes the module after all required options have been set. It does not display the options.

C. help: This command provides usage information for msfconsole commands themselves, not for the parameters of a specific module.

D. info: The info command displays detailed metadata about the selected module, including its name, author(s), a description of the vulnerability it targets, relevant references (like CVE numbers), and a list of compatible targets. It tells you what the module does, while show options tells you how to configure it.

Ethical Hacking with Metasploit, SQL & Crypto certification exam assessment practice question and answer (Q&A) dump including multiple choice questions (MCQ) and objective type questions, with detail explanation and reference available free, helpful to pass the Ethical Hacking with Metasploit, SQL & Crypto exam and earn Ethical Hacking with Metasploit, SQL & Crypto certificate.