{"id":29122,"date":"2023-08-14T09:12:10","date_gmt":"2023-08-14T06:12:10","guid":{"rendered":"https:\/\/linuxthebest.net\/?p=29122"},"modified":"2023-08-14T09:12:10","modified_gmt":"2023-08-14T06:12:10","slug":"yak-vstanoviti-metasploit-framework-u-kali-linux","status":"publish","type":"post","link":"https:\/\/linuxthebest.net\/uk\/yak-vstanoviti-metasploit-framework-u-kali-linux\/","title":{"rendered":"\u042f\u043a \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 Metasploit Framework \u0443 Kali Linux"},"content":{"rendered":"<p>Metasploit &#8211; \u0446\u0435 \u0432\u0456\u0434\u043e\u043c\u0438\u0439 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a \u0456\u0437 \u0432\u0456\u0434\u043a\u0440\u0438\u0442\u0438\u043c \u0432\u0438\u0445\u0456\u0434\u043d\u0438\u043c \u043a\u043e\u0434\u043e\u043c, \u044f\u043a\u0438\u0439 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c \u0441\u043f\u0456\u0432\u0440\u043e\u0431\u0456\u0442\u043d\u0438\u043a\u0438 \u0441\u043b\u0443\u0436\u0431 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0442\u0430 \u0435\u0442\u0438\u0447\u043d\u0456 \u0445\u0430\u043a\u0435\u0440\u0438 \u0434\u043b\u044f \u043e\u0446\u0456\u043d\u044e\u0432\u0430\u043d\u043d\u044f \u0437\u0430\u0445\u0438\u0449\u0435\u043d\u043e\u0441\u0442\u0456 \u0441\u0438\u0441\u0442\u0435\u043c. \u0412\u0456\u043d \u0434\u0430\u0454 \u0437\u043c\u043e\u0433\u0443 \u043c\u043e\u0434\u0435\u043b\u044e\u0432\u0430\u0442\u0438 \u0440\u0435\u0430\u043b\u044c\u043d\u0456 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438, \u0432\u0438\u044f\u0432\u043b\u044f\u0442\u0438 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0442\u0430 \u0437\u043c\u0456\u0446\u043d\u044e\u0432\u0430\u0442\u0438 \u0437\u0430\u0445\u0438\u0441\u0442 \u0432\u0456\u0434 \u043f\u043e\u0442\u0435\u043d\u0446\u0456\u0439\u043d\u0438\u0445 \u0437\u0430\u0433\u0440\u043e\u0437.<\/p>\n<p>\u0426\u0435\u0439 \u043f\u043e\u0442\u0443\u0436\u043d\u0438\u0439 \u043d\u0430\u0431\u0456\u0440 \u0456\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0456\u0432 \u0434\u0430\u0454 \u0437\u043c\u043e\u0433\u0443 \u043d\u0430 \u043a\u0440\u043e\u043a \u0432\u0438\u043f\u0435\u0440\u0435\u0434\u0436\u0430\u0442\u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0456\u0439\u043d\u0456 \u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u0442\u0430 \u0437\u043c\u0456\u0446\u043d\u044e\u0432\u0430\u0442\u0438 \u0437\u0430\u0445\u0438\u0441\u0442. \u0412\u0456\u0434 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043d\u044f \u0442\u0435\u0441\u0442\u0456\u0432 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u0435\u043d\u043d\u044f \u0434\u043e \u043e\u0446\u0456\u043d\u043a\u0438 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0435\u0439 &#8211; Metasploit \u0454 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0430\u043b\u044c\u043d\u0438\u043c \u043d\u0430\u0431\u043e\u0440\u043e\u043c \u0456\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0456\u0432 \u0434\u043b\u044f \u0442\u0438\u0445, \u0445\u0442\u043e \u043f\u0440\u0430\u0433\u043d\u0435 \u0437\u0430\u0445\u0438\u0441\u0442\u0438\u0442\u0438 \u0442\u0430 \u0437\u043c\u0456\u0446\u043d\u0438\u0442\u0438 \u0441\u0432\u043e\u0457 \u0446\u0438\u0444\u0440\u043e\u0432\u0456 \u0430\u043a\u0442\u0438\u0432\u0438.<\/p>\n<h2>\u041d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0456 \u0443\u043c\u043e\u0432\u0438 \u0442\u0430 \u0432\u0438\u043c\u043e\u0433\u0438<\/h2>\n<p>\u0414\u043b\u044f \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f Metasploit \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u043e \u0432\u0438\u043a\u043e\u043d\u0430\u0442\u0438 \u043d\u0438\u0437\u043a\u0443 \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u043d\u0456\u0445 \u0443\u043c\u043e\u0432 \u0456 \u0432\u0438\u043c\u043e\u0433:<\/p>\n<ul>\n<li>\u0412\u0438\u043c\u043a\u043d\u0443\u0442\u0438 \u0430\u043d\u0442\u0438\u0432\u0456\u0440\u0443\u0441\u043d\u0435 \u041f\u0417 &#8211; \u0430\u043d\u0442\u0438\u0432\u0456\u0440\u0443\u0441\u043d\u0435 \u041f\u0417 \u043c\u043e\u0436\u0435 \u043f\u043e\u0437\u043d\u0430\u0447\u0430\u0442\u0438 Metasploit Framework \u044f\u043a \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u0438\u0439 \u0447\u0435\u0440\u0435\u0437 \u0439\u043e\u0433\u043e \u0437\u0434\u0430\u0442\u043d\u0456\u0441\u0442\u044c \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0432\u0430\u0442\u0438 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0456, \u0449\u043e \u043c\u043e\u0436\u0435 \u043f\u0435\u0440\u0435\u0440\u0432\u0430\u0442\u0438 \u043f\u0440\u043e\u0446\u0435\u0441 \u0456\u043d\u0441\u0442\u0430\u043b\u044f\u0446\u0456\u0457. \u0429\u043e\u0431 \u0443\u043d\u0438\u043a\u043d\u0443\u0442\u0438 \u043f\u0435\u0440\u0435\u0440\u0438\u0432\u0430\u043d\u043d\u044f \u043f\u0440\u043e\u0446\u0435\u0441\u0443 \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f, \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0454\u0442\u044c\u0441\u044f \u0432\u0438\u043c\u043a\u043d\u0443\u0442\u0438 \u0430\u043d\u0442\u0438\u0432\u0456\u0440\u0443\u0441\u043d\u0435 \u041f\u0417.<\/li>\n<li>\u0412\u0438\u043c\u043a\u043d\u0456\u0442\u044c \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u0435\u0440\u0438 &#8211; \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u0435\u0440\u0438 \u043c\u043e\u0436\u0443\u0442\u044c \u0432\u0438\u044f\u0432\u0438\u0442\u0438 Metasploit \u044f\u043a \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u0435 \u041f\u0417 \u0456 \u043f\u0435\u0440\u0435\u0440\u0432\u0430\u0442\u0438 \u043f\u0440\u043e\u0446\u0435\u0441 \u0437\u0430\u0432\u0430\u043d\u0442\u0430\u0436\u0435\u043d\u043d\u044f. \u0429\u043e\u0431 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0438\u0442\u0438 \u0431\u0435\u0437\u043f\u0435\u0440\u0435\u0431\u0456\u0439\u043d\u0435 \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f, \u0432\u0438\u043c\u043a\u043d\u0456\u0442\u044c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0456 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u0435\u0440\u0438 \u043f\u0435\u0440\u0435\u0434 \u0437\u0430\u043f\u0443\u0441\u043a\u043e\u043c \u0430\u0431\u043e \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f\u043c Metasploit.<\/li>\n<li>\u041e\u0442\u0440\u0438\u043c\u0430\u043d\u043d\u044f \u043f\u0440\u0430\u0432 \u0430\u0434\u043c\u0456\u043d\u0456\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 &#8211; \u0414\u043b\u044f \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f Metasploit Framework \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0456 \u043f\u0440\u0430\u0432\u0430 \u0430\u0434\u043c\u0456\u043d\u0456\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0432 Kali Linux. \u041f\u0440\u0438\u0432\u0456\u043b\u0435\u0457 \u0430\u0434\u043c\u0456\u043d\u0456\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0434\u0430\u044e\u0442\u044c \u043f\u0440\u0430\u0432\u043e \u0432\u043d\u043e\u0441\u0438\u0442\u0438 \u0437\u043c\u0456\u043d\u0438 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0443, \u0437\u043e\u043a\u0440\u0435\u043c\u0430 \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u044e\u0432\u0430\u0442\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u0435 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0435\u043d\u043d\u044f \u0442\u0430 \u043d\u0430\u043b\u0430\u0448\u0442\u043e\u0432\u0443\u0432\u0430\u0442\u0438 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0438.<\/li>\n<\/ul>\n<h2>\u0427\u0438 \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u043d\u044c\u043e \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043e Metasploit \u0443 Kali Linux?<\/h2>\n<p>\u0422\u0430\u043a, Metasploit Framework \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u043d\u044c\u043e \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043e \u0432 Kali Linux 2.0 \u0443 \u0441\u043a\u043b\u0430\u0434\u0456 \u043f\u0430\u043a\u0435\u0442\u0443 \u041f\u0417 \u0437\u0430 \u0437\u0430\u043c\u043e\u0432\u0447\u0443\u0432\u0430\u043d\u043d\u044f\u043c, \u043e\u0434\u043d\u0430\u043a \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u043d\u044c\u043e \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 Metasploit Framework Community edition \u0431\u0456\u043b\u044c\u0448\u0435 \u043d\u0435 \u043f\u0456\u0434\u0442\u0440\u0438\u043c\u0443\u0454\u0442\u044c\u0441\u044f \u0432 Kali Linux 1.0.<\/p>\n<p><strong>\u041f\u0440\u0438\u043c\u0456\u0442\u043a\u0430:<\/strong> \u0411\u0456\u043b\u044c\u0448 \u0434\u0435\u0442\u0430\u043b\u044c\u043d\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u044e \u043f\u0440\u043e Metasploit \u043c\u043e\u0436\u043d\u0430 \u0437\u043d\u0430\u0439\u0442\u0438 \u043d\u0430 \u043e\u0444\u0456\u0446\u0456\u0439\u043d\u043e\u043c\u0443 \u0441\u0430\u0439\u0442\u0456 Rapid7.<\/p>\n<p>\u0429\u043e\u0431 \u043f\u0435\u0440\u0435\u0432\u0456\u0440\u0438\u0442\u0438, \u0447\u0438 \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043e Metasploit Framework \u0443 \u0432\u0430\u0448\u0456\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0456, \u043c\u043e\u0436\u043d\u0430 \u0432\u0456\u0434\u043a\u0440\u0438\u0442\u0438 &#8220;msfconsole&#8221;, \u0432\u0432\u0456\u0432\u0448\u0438 \u0432 \u0442\u0435\u0440\u043c\u0456\u043d\u0430\u043b\u0456 \u0437\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u0443 \u043a\u043e\u043c\u0430\u043d\u0434\u0443:<\/p>\n<pre><code class=\"language-bash\" data-line=\"\">$ msfconsole\nmsfconsole: command not found<\/code><\/pre>\n<p>\u041f\u043e\u043c\u0438\u043b\u043a\u0430 &#8220;msfconsole: command not found&#8221; \u0432\u043a\u0430\u0437\u0443\u0454 \u043d\u0430 \u0442\u0435, \u0449\u043e Metasploit \u043d\u0435 \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043e \u0443 \u0432\u0430\u0448\u0456\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0456. \u0406 \u043d\u0430\u0432\u043f\u0430\u043a\u0438, \u044f\u043a\u0449\u043e \u0437\u0430\u043f\u0443\u0441\u043a \u0432\u0456\u0434\u0431\u0443\u0432\u0430\u0454\u0442\u044c\u0441\u044f \u0431\u0435\u0437 \u043f\u043e\u043c\u0438\u043b\u043e\u043a, \u0446\u0435 \u043e\u0437\u043d\u0430\u0447\u0430\u0454, \u0449\u043e Metasploit \u0443\u0436\u0435 \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0456, \u0449\u043e \u0434\u0430\u0454 \u0437\u043c\u043e\u0433\u0443 \u043e\u043d\u043e\u0432\u0438\u0442\u0438 \u0439\u043e\u0433\u043e \u0437\u0430 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u043e\u044e \u0432\u0456\u0434\u043f\u043e\u0432\u0456\u0434\u043d\u043e\u0433\u043e \u0456\u043d\u0441\u0442\u0430\u043b\u044f\u0442\u043e\u0440\u0430.<\/p>\n<h2>\u0412\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f Metasploit \u0443 Kali Linux<\/h2>\n<p>\u0414\u043b\u044f \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f Metasploit Framework \u0443 Kali Linux \u043c\u043e\u0436\u043d\u0430 \u0441\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u0442\u0438\u0441\u044f \u0431\u0443\u0434\u044c-\u044f\u043a\u0438\u043c \u0456\u0437 \u043f\u0435\u0440\u0435\u043b\u0456\u0447\u0435\u043d\u0438\u0445 \u043d\u0438\u0436\u0447\u0435 \u0441\u043f\u043e\u0441\u043e\u0431\u0456\u0432.<\/p>\n<h3>1. \u0412\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f Metasploit \u0437\u0430 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u043e\u044e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0456\u044e<\/h3>\n<p>\u0421\u043f\u043e\u0447\u0430\u0442\u043a\u0443 \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u043e \u043e\u043d\u043e\u0432\u0438\u0442\u0438 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0438\u0439 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0456\u0439 \u043f\u0430\u043a\u0435\u0442\u0456\u0432, \u0430 \u043f\u043e\u0442\u0456\u043c \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 Metasploit, \u0432\u0438\u043a\u043e\u043d\u0430\u0432\u0448\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u0438 apt, \u044f\u043a \u043f\u043e\u043a\u0430\u0437\u0430\u043d\u043e \u043d\u0438\u0436\u0447\u0435.<\/p>\n<pre><code class=\"language-bash\" data-line=\"\">$ sudo apt update\n$ sudo apt install metasploit-framework<\/code><\/pre>\n<div class=\"wp-block-image\"><img data-recalc-dims=\"1\" decoding=\"async\" data-attachment-id=\"29124\" data-permalink=\"https:\/\/linuxthebest.net\/uk\/yak-vstanoviti-metasploit-framework-u-kali-linux\/install-metasploit-framework-in-kali-linux\/\" data-orig-file=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-framework-in-kali-linux.png?fit=807%2C494&amp;ssl=1\" data-orig-size=\"807,494\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Install-Metasploit-Framework-in-Kali-Linux\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-framework-in-kali-linux.png?fit=300%2C184&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-framework-in-kali-linux.png?fit=807%2C494&amp;ssl=1\" class=\"aligncenter size-full wp-image-29124 lazyload\" data-src=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-framework-in-kali-linux.png?resize=807%2C494&#038;ssl=1\" alt=\"\" width=\"807\" height=\"494\" data-srcset=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-framework-in-kali-linux.png?w=807&amp;ssl=1 807w, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-framework-in-kali-linux.png?resize=300%2C184&amp;ssl=1 300w, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-framework-in-kali-linux.png?resize=768%2C470&amp;ssl=1 768w\" data-sizes=\"(max-width: 807px) 100vw, 807px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 807px; --smush-placeholder-aspect-ratio: 807\/494;\" \/><\/div>\n<h3>2. \u0412\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f Metasploit \u0437\u0430 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u043e\u044e \u0441\u0446\u0435\u043d\u0430\u0440\u0456\u044e msfinstall<\/h3>\n<p>\u0406\u043d\u0448\u0438\u043c \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u043c \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f Metasploit \u0454 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u043a\u043b\u044e\u0447\u0430 \u043f\u0456\u0434\u043f\u0438\u0441\u0443 Rapid7. \u0414\u043b\u044f \u0446\u044c\u043e\u0433\u043e \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u043e \u0437\u0430\u0432\u0430\u043d\u0442\u0430\u0436\u0438\u0442\u0438 \u0441\u043a\u0440\u0438\u043f\u0442 \u043f\u0456\u0434 \u043d\u0430\u0437\u0432\u043e\u044e &#8220;msfinstall&#8221;, \u044f\u043a\u0438\u0439 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0443\u0454 \u043f\u0440\u043e\u0446\u0435\u0441 \u0456\u043c\u043f\u043e\u0440\u0442\u0443 \u0442\u0430 \u043d\u0430\u043b\u0430\u0448\u0442\u0443\u0432\u0430\u043d\u043d\u044f \u043f\u0430\u043a\u0435\u0442\u0430 \u0434\u043b\u044f \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f Metasploit.<\/p>\n<p>\u041a\u043e\u043c\u0430\u043d\u0434\u0438 \u0434\u043b\u044f \u0437\u0430\u0432\u0430\u043d\u0442\u0430\u0436\u0435\u043d\u043d\u044f \u0441\u043a\u0440\u0438\u043f\u0442\u0430 \u0442\u0430 \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f Metasploit \u0443 Linux.<\/p>\n<pre><code class=\"language-bash\" data-line=\"\">$ curl https:\/\/raw.githubusercontent.com\/rapid7\/metasploit-omnibus\/master\/config\/templates\/metasploit-framework-wrappers\/msfupdate.erb &gt; msfinstall\n$ sudo chmod 755 msfinstall\n$ sudo .\/msfinstall<\/code><\/pre>\n<div class=\"wp-block-image\"><img data-recalc-dims=\"1\" decoding=\"async\" data-attachment-id=\"29125\" data-permalink=\"https:\/\/linuxthebest.net\/uk\/yak-vstanoviti-metasploit-framework-u-kali-linux\/install-metasploit-in-kali-linux\/\" data-orig-file=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-in-kali-linux.png?fit=807%2C494&amp;ssl=1\" data-orig-size=\"807,494\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Install-Metasploit-in-Kali-Linux\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-in-kali-linux.png?fit=300%2C184&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-in-kali-linux.png?fit=807%2C494&amp;ssl=1\" class=\"aligncenter size-full wp-image-29125 lazyload\" data-src=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-in-kali-linux.png?resize=807%2C494&#038;ssl=1\" alt=\"\" width=\"807\" height=\"494\" data-srcset=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-in-kali-linux.png?w=807&amp;ssl=1 807w, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-in-kali-linux.png?resize=300%2C184&amp;ssl=1 300w, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/install-metasploit-in-kali-linux.png?resize=768%2C470&amp;ssl=1 768w\" data-sizes=\"(max-width: 807px) 100vw, 807px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 807px; --smush-placeholder-aspect-ratio: 807\/494;\" \/><\/div>\n<p><strong>\u041f\u0440\u0438\u043c\u0456\u0442\u043a\u0430:<\/strong> \u0426\u0435\u0439 \u043c\u0435\u0442\u043e\u0434 \u0442\u0430\u043a\u043e\u0436 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0454\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f \u0442\u0430 \u043e\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f Metasploit \u043d\u0430 \u0440\u0456\u0437\u043d\u0438\u0445 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u0430\u0445 Linux.<\/p>\n<p>\u041f\u0456\u0441\u043b\u044f \u0443\u0441\u043f\u0456\u0448\u043d\u043e\u0433\u043e \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044f Metasploit \u043d\u0430\u0441\u0442\u0443\u043f\u043d\u0438\u043c \u043a\u0440\u043e\u043a\u043e\u043c \u0431\u0443\u0434\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0431\u0430\u0437\u043e\u044e \u0434\u0430\u043d\u0438\u0445 (PostgreSQL). \u041e\u0434\u043d\u0430\u043a \u0432\u0430\u043c \u043c\u043e\u0436\u0435 \u0431\u0443\u0442\u0438 \u0446\u0456\u043a\u0430\u0432\u043e \u0434\u0456\u0437\u043d\u0430\u0442\u0438\u0441\u044f, \u0447\u043e\u043c\u0443 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0431\u0430\u0437\u043e\u044e \u0434\u0430\u043d\u0438\u0445 \u0442\u0430\u043a \u0432\u0430\u0436\u043b\u0438\u0432\u043e \u0434\u043b\u044f Metasploit.<\/p>\n<h2>\u0427\u043e\u043c\u0443 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0431\u0430\u0437\u043e\u044e \u0434\u0430\u043d\u0438\u0445 \u0432\u0430\u0436\u043b\u0438\u0432\u0435 \u0434\u043b\u044f Metasploit?<\/h2>\n<p>\u041f\u0440\u0438\u0447\u0438\u043d\u0430 \u043f\u0440\u043e\u0441\u0442\u0430: \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0431\u0430\u0437\u043e\u044e \u0434\u0430\u043d\u0438\u0445 \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u0454 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0435 \u0437\u0431\u0435\u0440\u0456\u0433\u0430\u043d\u043d\u044f \u0434\u0430\u043d\u0438\u0445, \u0441\u043f\u0456\u043b\u044c\u043d\u0443 \u0440\u043e\u0431\u043e\u0442\u0443 \u043a\u0456\u043b\u044c\u043a\u043e\u0445 \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456\u0432, \u0430 \u0442\u0430\u043a\u043e\u0436 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0435 \u0432\u0456\u0434\u0441\u0442\u0435\u0436\u0435\u043d\u043d\u044f \u0442\u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044f \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0456\u0432 \u043e\u0446\u0456\u043d\u043a\u0438. \u041a\u0440\u0456\u043c \u0442\u043e\u0433\u043e, \u0432\u043e\u043d\u043e \u0437\u0430\u0431\u0435\u0437\u043f\u0435\u0447\u0443\u0454 \u043b\u0435\u0433\u043a\u0443 \u0456\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044e \u0437 \u0456\u043d\u0448\u0438\u043c\u0438 \u0437\u0430\u0441\u043e\u0431\u0430\u043c\u0438 \u0437\u0430\u0445\u0438\u0441\u0442\u0443, \u0441\u043f\u0440\u043e\u0449\u0443\u044e\u0447\u0438 \u043f\u0440\u043e\u0446\u0435\u0441 \u0442\u0435\u0441\u0442\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u0435\u043d\u043d\u044f.<\/p>\n<p>\u0414\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0431\u0430\u0437\u043e\u044e \u0434\u0430\u043d\u0438\u0445 Metasploit \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c\u0441\u044f \u0442\u0430\u043a\u0456 \u043a\u043e\u043c\u0430\u043d\u0434\u0438:<\/p>\n<table width=\"800\">\n<tbody>\n<tr>\n<td>No.<\/td>\n<td>Commands<\/td>\n<td>Usage<\/td>\n<\/tr>\n<tr>\n<td>1.<\/td>\n<td>msfdb init<\/td>\n<td>Initiate the database<\/td>\n<\/tr>\n<tr>\n<td>2.<\/td>\n<td>msfdb reinit<\/td>\n<td>Reset the database to its initial state<\/td>\n<\/tr>\n<tr>\n<td>3.<\/td>\n<td>msfdb delete<\/td>\n<td>Delete\/remove the database<\/td>\n<\/tr>\n<tr>\n<td>4.<\/td>\n<td>msfdb start<\/td>\n<td>Starts the database<\/td>\n<\/tr>\n<tr>\n<td>5.<\/td>\n<td>msfdb stop<\/td>\n<td>Stops the database<\/td>\n<\/tr>\n<tr>\n<td>6.<\/td>\n<td>msfdb status<\/td>\n<td>Shows the database status<\/td>\n<\/tr>\n<tr>\n<td>7.<\/td>\n<td>msfdb run<\/td>\n<td>Start the database and execute \u201cmsfconsole\u201d<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>\u041d\u0430\u043b\u0430\u0448\u0442\u0443\u0432\u0430\u043d\u043d\u044f PostgreSQL \u0434\u043b\u044f Metasploit<\/h2>\n<p>\u0414\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0443 \u0431\u0430\u0437\u0438 \u0434\u0430\u043d\u0438\u0445 \u0434\u043e\u0441\u0442\u0430\u0442\u043d\u044c\u043e \u0432\u0438\u043a\u043e\u043d\u0430\u0442\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u0443 &#8220;start&#8221;, \u044f\u043a \u043f\u043e\u043a\u0430\u0437\u0430\u043d\u043e \u043d\u0438\u0436\u0447\u0435:<\/p>\n<pre><code class=\"language-bash\" data-line=\"\">$ sudo msfdb start\u00a0\n[+] Starting database<\/code><\/pre>\n<p>\u041f\u0456\u0441\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0443 \u0431\u0430\u0437\u0438 \u0434\u0430\u043d\u0438\u0445 \u0456\u043d\u0456\u0446\u0456\u0430\u043b\u0456\u0437\u0443\u0454\u043c\u043e \u0457\u0457 \u0437\u0430 \u0434\u043e\u043f\u043e\u043c\u043e\u0433\u043e\u044e \u043a\u043e\u043c\u0430\u043d\u0434\u0438 &#8220;init&#8221;, \u044f\u043a\u0430 \u0441\u0442\u0432\u043e\u0440\u0438\u0442\u044c \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0430, \u0431\u0430\u0437\u0443 \u0434\u0430\u043d\u0438\u0445, \u043a\u043e\u043d\u0444\u0456\u0433\u0443\u0440\u0430\u0446\u0456\u0439\u043d\u0438\u0439 \u0444\u0430\u0439\u043b \u0442\u0430 \u0456\u043d\u0456\u0446\u0456\u0430\u043b\u0456\u0437\u0443\u0454 \u0441\u0445\u0435\u043c\u0443 \u0431\u0430\u0437\u0438 \u0434\u0430\u043d\u0438\u0445:<\/p>\n<pre><code class=\"language-bash\" data-line=\"\">$ sudo msfdb init\u00a0\n\n[i] Database already started\n[+] Creating database user &#039;msf&#039;\n[+] Creating databases &#039;msf&#039;\n[+] Creating databases &#039;msf_test&#039;\n[+] Creating configuration file &#039;\/usr\/share\/metasploit-framework\/config\/database.yml&#039;\n[+] Creating initial database schema<\/code><\/pre>\n<p>\u041f\u043e\u0442\u0456\u043c \u043f\u0435\u0440\u0435\u0432\u0456\u0440\u0442\u0435 \u0441\u0442\u0430\u0442\u0443\u0441 \u0431\u0430\u0437\u0438 \u0434\u0430\u043d\u0438\u0445 \u0434\u043b\u044f \u043f\u0456\u0434\u0442\u0432\u0435\u0440\u0434\u0436\u0435\u043d\u043d\u044f:<\/p>\n<pre><code class=\"language-bash\" data-line=\"\">$ sudo msfdb status<\/code><\/pre>\n<div class=\"wp-block-image\"><img data-recalc-dims=\"1\" decoding=\"async\" data-attachment-id=\"29126\" data-permalink=\"https:\/\/linuxthebest.net\/uk\/yak-vstanoviti-metasploit-framework-u-kali-linux\/check-database-status\/\" data-orig-file=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/check-database-status.png?fit=807%2C494&amp;ssl=1\" data-orig-size=\"807,494\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Check-Database-Status\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/check-database-status.png?fit=300%2C184&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/check-database-status.png?fit=807%2C494&amp;ssl=1\" class=\"aligncenter size-full wp-image-29126 lazyload\" data-src=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/check-database-status.png?resize=807%2C494&#038;ssl=1\" alt=\"\" width=\"807\" height=\"494\" data-srcset=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/check-database-status.png?w=807&amp;ssl=1 807w, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/check-database-status.png?resize=300%2C184&amp;ssl=1 300w, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/check-database-status.png?resize=768%2C470&amp;ssl=1 768w\" data-sizes=\"(max-width: 807px) 100vw, 807px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 807px; --smush-placeholder-aspect-ratio: 807\/494;\" \/><\/div>\n<p><strong>\u041f\u0440\u0438\u043c\u0456\u0442\u043a\u0430:<\/strong> \u0414\u0430\u043b\u0456 \u043c\u043e\u0436\u043d\u0430 \u0432\u0438\u043a\u043e\u043d\u0430\u0442\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u0443 &#8220;sudo msfdb run&#8221; \u0434\u043b\u044f \u043d\u0430\u043b\u0430\u0448\u0442\u0443\u0432\u0430\u043d\u043d\u044f \u0441\u0435\u0440\u0435\u0434\u043e\u0432\u0438\u0449\u0430, \u0430 \u043f\u043e\u0442\u0456\u043c \u043a\u043e\u043c\u0430\u043d\u0434\u0443 &#8220;msfconsole&#8221; \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u0434\u043e \u043f\u043e\u0442\u0443\u0436\u043d\u0438\u0445 \u0456\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0456\u0432 \u0435\u0442\u0438\u0447\u043d\u043e\u0433\u043e \u0437\u043b\u043e\u043c\u0443.<\/p>\n<p>\u041f\u0456\u0441\u043b\u044f \u043d\u0430\u043b\u0430\u0448\u0442\u0443\u0432\u0430\u043d\u043d\u044f \u0431\u0430\u0437\u0438 \u0434\u0430\u043d\u0438\u0445 \u043c\u043e\u0436\u043d\u0430 \u0432\u0456\u0434\u043a\u0440\u0438\u0442\u0438 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a Metasploit, \u0432\u0438\u043a\u043e\u043d\u0430\u0432\u0448\u0438 \u0437\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u0443 \u043a\u043e\u043c\u0430\u043d\u0434\u0443:<\/p>\n<pre><code class=\"language-bash\" data-line=\"\">$ msfconsole<\/code><\/pre>\n<p>\u0417\u0430\u043f\u0443\u0441\u043a \u0446\u0456\u0454\u0457 \u043a\u043e\u043c\u0430\u043d\u0434\u0438 \u043c\u043e\u0436\u0435 \u0437\u0430\u0439\u043d\u044f\u0442\u0438 \u0434\u0435\u044f\u043a\u0438\u0439 \u0447\u0430\u0441:<\/p>\n<pre><code class=\"language-bash\" data-line=\"\">[*] Starting the Metasploit Framework console...<\/code><\/pre>\n<p>\u041f\u0456\u0434 \u0447\u0430\u0441 \u0437\u0430\u043f\u0443\u0441\u043a\u0443 Metasploit \u043c\u043e\u0436\u043d\u0430 \u043f\u0435\u0440\u0435\u043a\u043e\u043d\u0430\u0442\u0438\u0441\u044f \u0432 \u0442\u043e\u043c\u0443, \u0449\u043e \u0431\u0430\u0437\u0430 \u0434\u0430\u043d\u0438\u0445 \u043f\u0456\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u0447\u0438 \u043d\u0456, \u043f\u0435\u0440\u0435\u0432\u0456\u0440\u0438\u0432\u0448\u0438 \u0441\u0442\u0430\u0442\u0443\u0441. \u0414\u043b\u044f \u0446\u044c\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u0442\u043e \u0432\u0432\u0435\u0434\u0456\u0442\u044c \u0443 \u0442\u0435\u0440\u043c\u0456\u043d\u0430\u043b\u0456 Metasploit \u043d\u0430\u0432\u0435\u0434\u0435\u043d\u0443 \u043d\u0438\u0436\u0447\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u0443:<\/p>\n<pre><code class=\"language-bash\" data-line=\"\">msf6 &gt; db_status\u00a0\n\n[*] Connected to msf. Connection type: postgresql.<\/code><\/pre>\n<p>\u0456 \u043f\u043e\u0432\u0456\u0434\u043e\u043c\u043b\u0435\u043d\u043d\u044f &#8220;Connected to msf&#8221; \u0441\u0432\u0456\u0434\u0447\u0438\u0442\u044c \u043f\u0440\u043e \u0442\u0435, \u0449\u043e \u0431\u0430\u0437\u0430 \u0434\u0430\u043d\u0438\u0445 \u043f\u0456\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0430.<\/p>\n<div class=\"wp-block-image\"><img data-recalc-dims=\"1\" decoding=\"async\" data-attachment-id=\"29127\" data-permalink=\"https:\/\/linuxthebest.net\/uk\/yak-vstanoviti-metasploit-framework-u-kali-linux\/connect-metasploit-framework-in-kali-linux\/\" data-orig-file=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/connect-metasploit-framework-in-kali-linux.png?fit=807%2C494&amp;ssl=1\" data-orig-size=\"807,494\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Connect-Metasploit-Framework-in-Kali-Linux\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/connect-metasploit-framework-in-kali-linux.png?fit=300%2C184&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/connect-metasploit-framework-in-kali-linux.png?fit=807%2C494&amp;ssl=1\" class=\"aligncenter size-full wp-image-29127 lazyload\" data-src=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/connect-metasploit-framework-in-kali-linux.png?resize=807%2C494&#038;ssl=1\" alt=\"\" width=\"807\" height=\"494\" data-srcset=\"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/connect-metasploit-framework-in-kali-linux.png?w=807&amp;ssl=1 807w, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/connect-metasploit-framework-in-kali-linux.png?resize=300%2C184&amp;ssl=1 300w, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/connect-metasploit-framework-in-kali-linux.png?resize=768%2C470&amp;ssl=1 768w\" data-sizes=\"(max-width: 807px) 100vw, 807px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 807px; --smush-placeholder-aspect-ratio: 807\/494;\" \/><\/div>\n<p>\u042f\u043a\u0449\u043e \u0431\u0430\u0437\u0430 \u0434\u0430\u043d\u0438\u0445 \u043d\u0435 \u043f\u0456\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u0434\u043e Metasploit, \u0442\u043e \u0457\u0457 \u043c\u043e\u0436\u043d\u0430 \u043f\u0456\u0434\u043a\u043b\u044e\u0447\u0438\u0442\u0438, \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0447\u0438 \u043d\u0430\u0432\u0435\u0434\u0435\u043d\u0438\u0439 \u043d\u0438\u0436\u0447\u0435 \u0441\u0438\u043d\u0442\u0430\u043a\u0441\u0438\u0441:<\/p>\n<pre><code class=\"language-bash\" data-line=\"\">msf6 &gt; db_connect your_msfdb_user:your_msfdb_pswd@127.0.0.1:5432\/msf_database<\/code><\/pre>\n<p>\u0417 \u043d\u0430\u0432\u0435\u0434\u0435\u043d\u043e\u0433\u043e \u0432\u0438\u0449\u0435 \u0441\u0438\u043d\u0442\u0430\u043a\u0441\u0438\u0441\u0443 \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u043e \u0437\u0430\u043c\u0456\u043d\u0438\u0442\u0438:<\/p>\n<ul>\n<li>&#8220;your_msfdb_user&#8221; \u043d\u0430 \u0456\u043c&#8217;\u044f \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0430 \u0431\u0430\u0437\u0438 \u0434\u0430\u043d\u0438\u0445.<\/li>\n<li>&#8220;your_msfdb_pswd&#8221; \u043d\u0430 \u043f\u0430\u0440\u043e\u043b\u044c \u0434\u043e \u0431\u0430\u0437\u0438 \u0434\u0430\u043d\u0438\u0445.<\/li>\n<\/ul>\n<p>\u041f\u0456\u0441\u043b\u044f \u0442\u043e\u0433\u043e \u044f\u043a \u0432\u0441\u0435 \u043d\u0430\u043b\u0430\u0448\u0442\u043e\u0432\u0430\u043d\u043e, \u0432\u0438 \u043c\u043e\u0436\u0435\u0442\u0435 \u043d\u0430\u0441\u043e\u043b\u043e\u0434\u0436\u0443\u0432\u0430\u0442\u0438\u0441\u044f \u043c\u043e\u0436\u043b\u0438\u0432\u043e\u0441\u0442\u044f\u043c\u0438 Metasploit!<\/p>\n<h2>\u0412\u0438\u0441\u043d\u043e\u0432\u043e\u043a<\/h2>\n<p>Metasploit &#8211; \u0446\u0435 \u043f\u043e\u0442\u0443\u0436\u043d\u0438\u0439 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a \u0434\u043b\u044f \u0442\u0435\u0441\u0442\u0443\u0432\u0430\u043d\u043d\u044f \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u0435\u043d\u043d\u044f \u0437 \u0432\u0456\u0434\u043a\u0440\u0438\u0442\u0438\u043c \u0432\u0438\u0445\u0456\u0434\u043d\u0438\u043c \u043a\u043e\u0434\u043e\u043c, \u0440\u043e\u0437\u0440\u043e\u0431\u043b\u0435\u043d\u0438\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0456\u0454\u044e Rapid7, \u044f\u043a\u0438\u0439 \u0434\u0430\u0454 \u0437\u043c\u043e\u0433\u0443 \u043e\u0446\u0456\u043d\u0438\u0442\u0438 \u0431\u0435\u0437\u043f\u0435\u043a\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u0438, \u0432\u0438\u044f\u0432\u0438\u0442\u0438 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0442\u0430 \u0437\u043c\u0456\u0446\u043d\u0438\u0442\u0438 \u0437\u0430\u0445\u0438\u0441\u0442 \u0432\u0456\u0434 \u043f\u043e\u0442\u0435\u043d\u0446\u0456\u0439\u043d\u0438\u0445 \u0437\u0430\u0433\u0440\u043e\u0437.<\/p>\n<p>\u0414\u043e\u0442\u0440\u0438\u043c\u0443\u044e\u0447\u0438\u0441\u044c \u043f\u043e\u043a\u0440\u043e\u043a\u043e\u0432\u043e\u0457 \u0456\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0456\u0457, \u043a\u043e\u0440\u0438\u0441\u0442\u0443\u0432\u0430\u0447\u0456 \u0437\u043c\u043e\u0436\u0443\u0442\u044c \u043b\u0435\u0433\u043a\u043e \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 Metasploit \u0456 \u043a\u0435\u0440\u0443\u0432\u0430\u0442\u0438 \u0431\u0430\u0437\u043e\u044e \u0434\u0430\u043d\u0438\u0445, \u0449\u043e\u0431 \u0440\u043e\u0437\u043a\u0440\u0438\u0442\u0438 \u0432\u0435\u0441\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0456\u0430\u043b \u0446\u044c\u043e\u0433\u043e \u043d\u0430\u0439\u0432\u0430\u0436\u043b\u0438\u0432\u0456\u0448\u043e\u0433\u043e \u0456\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u0440\u0456\u044e, \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e \u0437\u0430\u0445\u0438\u0449\u0430\u044e\u0447\u0438 \u0456 \u0437\u043c\u0456\u0446\u043d\u044e\u044e\u0447\u0438 \u0441\u0432\u043e\u0457 \u0446\u0438\u0444\u0440\u043e\u0432\u0456 \u0430\u043a\u0442\u0438\u0432\u0438.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Metasploit &#8211; \u0446\u0435 \u0432\u0456\u0434\u043e\u043c\u0438\u0439 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a \u0456\u0437 \u0432\u0456\u0434\u043a\u0440\u0438\u0442\u0438\u043c \u0432\u0438\u0445\u0456\u0434\u043d\u0438\u043c \u043a\u043e\u0434\u043e\u043c, \u044f\u043a\u0438\u0439 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c \u0441\u043f\u0456\u0432\u0440\u043e\u0431\u0456\u0442\u043d\u0438\u043a\u0438 \u0441\u043b\u0443\u0436\u0431 \u043a\u0456\u0431\u0435\u0440\u0431\u0435\u0437\u043f\u0435\u043a\u0438 \u0442\u0430 \u0435\u0442\u0438\u0447\u043d\u0456 \u0445\u0430\u043a\u0435\u0440\u0438 \u0434\u043b\u044f \u043e\u0446\u0456\u043d\u044e\u0432\u0430\u043d\u043d\u044f \u0437\u0430\u0445\u0438\u0449\u0435\u043d\u043e\u0441\u0442\u0456 \u0441\u0438\u0441\u0442\u0435\u043c. \u0412\u0456\u043d \u0434\u0430\u0454 \u0437\u043c\u043e\u0433\u0443 \u043c\u043e\u0434\u0435\u043b\u044e\u0432\u0430\u0442\u0438 \u0440\u0435\u0430\u043b\u044c\u043d\u0456 \u043a\u0456\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438, \u0432\u0438\u044f\u0432\u043b\u044f\u0442\u0438 \u0432\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0442\u0430 \u0437\u043c\u0456\u0446\u043d\u044e\u0432\u0430\u0442\u0438 \u0437\u0430\u0445\u0438\u0441\u0442 \u0432\u0456\u0434 \u043f\u043e\u0442\u0435\u043d\u0446\u0456\u0439\u043d\u0438\u0445 \u0437\u0430\u0433\u0440\u043e\u0437. \u0426\u0435\u0439 \u043f\u043e\u0442\u0443\u0436\u043d\u0438\u0439 \u043d\u0430\u0431\u0456\u0440 \u0456\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0456\u0432 \u0434\u0430\u0454 \u0437\u043c\u043e\u0433\u0443 \u043d\u0430 \u043a\u0440\u043e\u043a \u0432\u0438\u043f\u0435\u0440\u0435\u0434\u0436\u0430\u0442\u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0456\u0439\u043d\u0456 \u0437\u0430\u0433\u0440\u043e\u0437\u0438 \u0442\u0430 \u0437\u043c\u0456\u0446\u043d\u044e\u0432\u0430\u0442\u0438 \u0437\u0430\u0445\u0438\u0441\u0442. \u0412\u0456\u0434 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043d\u044f \u0442\u0435\u0441\u0442\u0456\u0432 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u0435\u043d\u043d\u044f \u0434\u043e [&hellip;]<\/p>\n","protected":false},"author":3227,"featured_media":29123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[211,3],"tags":[4058,1284,4057],"class_list":["post-29122","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-terminal","category-review","tag-framework","tag-kali-linux","tag-metasploit"],"blocksy_meta":[],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"uk","enabled_languages":["ru","uk"],"languages":{"ru":{"title":true,"content":true,"excerpt":false},"uk":{"title":true,"content":true,"excerpt":false}}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u042f\u043a \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 Metasploit Framework \u0443 Kali Linux<\/title>\n<meta name=\"description\" content=\"Metasploit - \u0446\u0435 \u0432\u0456\u0434\u043e\u043c\u0438\u0439 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a \u0456\u0437 \u0432\u0456\u0434\u043a\u0440\u0438\u0442\u0438\u043c \u0432\u0438\u0445\u0456\u0434\u043d\u0438\u043c \u043a\u043e\u0434\u043e\u043c, \u044f\u043a\u0438\u0439 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c \u0434\u043b\u044f \u043e\u0446\u0456\u043d\u044e\u0432\u0430\u043d\u043d\u044f \u0437\u0430\u0445\u0438\u0449\u0435\u043d\u043e\u0441\u0442\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/\" \/>\n<meta property=\"og:locale\" content=\"uk_UA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u042f\u043a \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 Metasploit Framework \u0443 Kali Linux\" \/>\n<meta property=\"og:description\" content=\"Metasploit - \u0446\u0435 \u0432\u0456\u0434\u043e\u043c\u0438\u0439 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a \u0456\u0437 \u0432\u0456\u0434\u043a\u0440\u0438\u0442\u0438\u043c \u0432\u0438\u0445\u0456\u0434\u043d\u0438\u043c \u043a\u043e\u0434\u043e\u043c, \u044f\u043a\u0438\u0439 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c \u0434\u043b\u044f \u043e\u0446\u0456\u043d\u044e\u0432\u0430\u043d\u043d\u044f \u0437\u0430\u0445\u0438\u0449\u0435\u043d\u043e\u0441\u0442\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\" \/>\n<meta property=\"og:url\" content=\"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"LinuxTheBest\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/UserAndLINUX\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-14T06:12:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/metasploit-diesec.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"walle9054\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@UserAndLINUX\" \/>\n<meta name=\"twitter:site\" content=\"@UserAndLINUX\" \/>\n<meta name=\"twitter:label1\" content=\"\u041d\u0430\u043f\u0438\u0441\u0430\u043d\u043e\" \/>\n\t<meta name=\"twitter:data1\" content=\"walle9054\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u041f\u0440\u0438\u0431\u043b. \u0447\u0430\u0441 \u0447\u0438\u0442\u0430\u043d\u043d\u044f\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 \u0445\u0432\u0438\u043b\u0438\u043d\u0438\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/yak-vstanoviti-metasploit-framework-u-kali-linux\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/yak-vstanoviti-metasploit-framework-u-kali-linux\\\/\"},\"author\":{\"name\":\"walle9054\",\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/#\\\/schema\\\/person\\\/4ef8b04b8a00956d024e66df7f488c3b\"},\"headline\":\"\u042f\u043a \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 Metasploit Framework \u0443 Kali Linux\",\"datePublished\":\"2023-08-14T06:12:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/yak-vstanoviti-metasploit-framework-u-kali-linux\\\/\"},\"wordCount\":1452,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/yak-vstanoviti-metasploit-framework-u-kali-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/linuxthebest.net\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/metasploit-diesec.jpg?fit=1280%2C600&ssl=1\",\"keywords\":[\"Framework\",\"kali linux\",\"Metasploit\"],\"articleSection\":[\"\u0418\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438\",\"\u041e\u0431\u0437\u043e\u0440\u044b\"],\"inLanguage\":\"uk\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/linuxthebest.net\\\/yak-vstanoviti-metasploit-framework-u-kali-linux\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/yak-vstanoviti-metasploit-framework-u-kali-linux\\\/\",\"url\":\"https:\\\/\\\/linuxthebest.net\\\/yak-vstanoviti-metasploit-framework-u-kali-linux\\\/\",\"name\":\"\u042f\u043a \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 Metasploit Framework \u0443 Kali Linux\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/yak-vstanoviti-metasploit-framework-u-kali-linux\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/yak-vstanoviti-metasploit-framework-u-kali-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/linuxthebest.net\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/metasploit-diesec.jpg?fit=1280%2C600&ssl=1\",\"datePublished\":\"2023-08-14T06:12:10+00:00\",\"description\":\"Metasploit - \u0446\u0435 \u0432\u0456\u0434\u043e\u043c\u0438\u0439 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a \u0456\u0437 \u0432\u0456\u0434\u043a\u0440\u0438\u0442\u0438\u043c \u0432\u0438\u0445\u0456\u0434\u043d\u0438\u043c \u043a\u043e\u0434\u043e\u043c, \u044f\u043a\u0438\u0439 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c \u0434\u043b\u044f \u043e\u0446\u0456\u043d\u044e\u0432\u0430\u043d\u043d\u044f \u0437\u0430\u0445\u0438\u0449\u0435\u043d\u043e\u0441\u0442\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/yak-vstanoviti-metasploit-framework-u-kali-linux\\\/#breadcrumb\"},\"inLanguage\":\"uk\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/linuxthebest.net\\\/yak-vstanoviti-metasploit-framework-u-kali-linux\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"uk\",\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/yak-vstanoviti-metasploit-framework-u-kali-linux\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/linuxthebest.net\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/metasploit-diesec.jpg?fit=1280%2C600&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/linuxthebest.net\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/metasploit-diesec.jpg?fit=1280%2C600&ssl=1\",\"width\":1280,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/yak-vstanoviti-metasploit-framework-u-kali-linux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f\",\"item\":\"https:\\\/\\\/linuxthebest.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u041e\u0431\u0437\u043e\u0440\u044b\",\"item\":\"https:\\\/\\\/linuxthebest.net\\\/review\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"\u041a\u0430\u043a \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c Metasploit Framework \u0432 Kali Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/#website\",\"url\":\"https:\\\/\\\/linuxthebest.net\\\/\",\"name\":\"LinuxTheBest\",\"description\":\"\u0412\u0430\u0448 \u043f\u0440\u043e\u0432\u0456\u0434\u043d\u0438\u043a \u0443 \u0434\u0438\u0432\u043e\u0432\u0438\u0436\u043d\u0438\u0439 \u0441\u0432\u0456\u0442 Linux\",\"publisher\":{\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/linuxthebest.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"uk\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/#organization\",\"name\":\"UALinux\",\"url\":\"https:\\\/\\\/linuxthebest.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"uk\",\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/linuxthebest.net\\\/wp-content\\\/uploads\\\/2010\\\/06\\\/UALinux.png\",\"contentUrl\":\"https:\\\/\\\/linuxthebest.net\\\/wp-content\\\/uploads\\\/2010\\\/06\\\/UALinux.png\",\"width\":270,\"height\":73,\"caption\":\"UALinux\"},\"image\":{\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/UserAndLINUX\",\"https:\\\/\\\/x.com\\\/UserAndLINUX\",\"https:\\\/\\\/www.linkedin.com\\\/groups\\\/7487863\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/linuxthebest.net\\\/#\\\/schema\\\/person\\\/4ef8b04b8a00956d024e66df7f488c3b\",\"name\":\"walle9054\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"uk\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ca1cd3a0da5794e9defce526252afa41fcd26be7662ae17e81bf6e994b1b2c1d?s=96&d=wavatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ca1cd3a0da5794e9defce526252afa41fcd26be7662ae17e81bf6e994b1b2c1d?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ca1cd3a0da5794e9defce526252afa41fcd26be7662ae17e81bf6e994b1b2c1d?s=96&d=wavatar&r=g\",\"caption\":\"walle9054\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u042f\u043a \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 Metasploit Framework \u0443 Kali Linux","description":"Metasploit - \u0446\u0435 \u0432\u0456\u0434\u043e\u043c\u0438\u0439 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a \u0456\u0437 \u0432\u0456\u0434\u043a\u0440\u0438\u0442\u0438\u043c \u0432\u0438\u0445\u0456\u0434\u043d\u0438\u043c \u043a\u043e\u0434\u043e\u043c, \u044f\u043a\u0438\u0439 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c \u0434\u043b\u044f \u043e\u0446\u0456\u043d\u044e\u0432\u0430\u043d\u043d\u044f \u0437\u0430\u0445\u0438\u0449\u0435\u043d\u043e\u0441\u0442\u0456 \u0441\u0438\u0441\u0442\u0435\u043c","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/","og_locale":"uk_UA","og_type":"article","og_title":"\u042f\u043a \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 Metasploit Framework \u0443 Kali Linux","og_description":"Metasploit - \u0446\u0435 \u0432\u0456\u0434\u043e\u043c\u0438\u0439 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a \u0456\u0437 \u0432\u0456\u0434\u043a\u0440\u0438\u0442\u0438\u043c \u0432\u0438\u0445\u0456\u0434\u043d\u0438\u043c \u043a\u043e\u0434\u043e\u043c, \u044f\u043a\u0438\u0439 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c \u0434\u043b\u044f \u043e\u0446\u0456\u043d\u044e\u0432\u0430\u043d\u043d\u044f \u0437\u0430\u0445\u0438\u0449\u0435\u043d\u043e\u0441\u0442\u0456 \u0441\u0438\u0441\u0442\u0435\u043c","og_url":"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/","og_site_name":"LinuxTheBest","article_publisher":"https:\/\/www.facebook.com\/UserAndLINUX","article_published_time":"2023-08-14T06:12:10+00:00","og_image":[{"width":1280,"height":600,"url":"https:\/\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/metasploit-diesec.jpg","type":"image\/jpeg"}],"author":"walle9054","twitter_card":"summary_large_image","twitter_creator":"@UserAndLINUX","twitter_site":"@UserAndLINUX","twitter_misc":{"\u041d\u0430\u043f\u0438\u0441\u0430\u043d\u043e":"walle9054","\u041f\u0440\u0438\u0431\u043b. \u0447\u0430\u0441 \u0447\u0438\u0442\u0430\u043d\u043d\u044f":"2 \u0445\u0432\u0438\u043b\u0438\u043d\u0438"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/#article","isPartOf":{"@id":"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/"},"author":{"name":"walle9054","@id":"https:\/\/linuxthebest.net\/#\/schema\/person\/4ef8b04b8a00956d024e66df7f488c3b"},"headline":"\u042f\u043a \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 Metasploit Framework \u0443 Kali Linux","datePublished":"2023-08-14T06:12:10+00:00","mainEntityOfPage":{"@id":"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/"},"wordCount":1452,"commentCount":0,"publisher":{"@id":"https:\/\/linuxthebest.net\/#organization"},"image":{"@id":"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/metasploit-diesec.jpg?fit=1280%2C600&ssl=1","keywords":["Framework","kali linux","Metasploit"],"articleSection":["\u0418\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438","\u041e\u0431\u0437\u043e\u0440\u044b"],"inLanguage":"uk","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/","url":"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/","name":"\u042f\u043a \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 Metasploit Framework \u0443 Kali Linux","isPartOf":{"@id":"https:\/\/linuxthebest.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/#primaryimage"},"image":{"@id":"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/metasploit-diesec.jpg?fit=1280%2C600&ssl=1","datePublished":"2023-08-14T06:12:10+00:00","description":"Metasploit - \u0446\u0435 \u0432\u0456\u0434\u043e\u043c\u0438\u0439 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a \u0456\u0437 \u0432\u0456\u0434\u043a\u0440\u0438\u0442\u0438\u043c \u0432\u0438\u0445\u0456\u0434\u043d\u0438\u043c \u043a\u043e\u0434\u043e\u043c, \u044f\u043a\u0438\u0439 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u044e\u0442\u044c \u0434\u043b\u044f \u043e\u0446\u0456\u043d\u044e\u0432\u0430\u043d\u043d\u044f \u0437\u0430\u0445\u0438\u0449\u0435\u043d\u043e\u0441\u0442\u0456 \u0441\u0438\u0441\u0442\u0435\u043c","breadcrumb":{"@id":"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/#breadcrumb"},"inLanguage":"uk","potentialAction":[{"@type":"ReadAction","target":["https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/"]}]},{"@type":"ImageObject","inLanguage":"uk","@id":"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/#primaryimage","url":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/metasploit-diesec.jpg?fit=1280%2C600&ssl=1","contentUrl":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/metasploit-diesec.jpg?fit=1280%2C600&ssl=1","width":1280,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/linuxthebest.net\/yak-vstanoviti-metasploit-framework-u-kali-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f","item":"https:\/\/linuxthebest.net\/"},{"@type":"ListItem","position":2,"name":"\u041e\u0431\u0437\u043e\u0440\u044b","item":"https:\/\/linuxthebest.net\/review\/"},{"@type":"ListItem","position":3,"name":"\u041a\u0430\u043a \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c Metasploit Framework \u0432 Kali Linux"}]},{"@type":"WebSite","@id":"https:\/\/linuxthebest.net\/#website","url":"https:\/\/linuxthebest.net\/","name":"LinuxTheBest","description":"\u0412\u0430\u0448 \u043f\u0440\u043e\u0432\u0456\u0434\u043d\u0438\u043a \u0443 \u0434\u0438\u0432\u043e\u0432\u0438\u0436\u043d\u0438\u0439 \u0441\u0432\u0456\u0442 Linux","publisher":{"@id":"https:\/\/linuxthebest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/linuxthebest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"uk"},{"@type":"Organization","@id":"https:\/\/linuxthebest.net\/#organization","name":"UALinux","url":"https:\/\/linuxthebest.net\/","logo":{"@type":"ImageObject","inLanguage":"uk","@id":"https:\/\/linuxthebest.net\/#\/schema\/logo\/image\/","url":"https:\/\/linuxthebest.net\/wp-content\/uploads\/2010\/06\/UALinux.png","contentUrl":"https:\/\/linuxthebest.net\/wp-content\/uploads\/2010\/06\/UALinux.png","width":270,"height":73,"caption":"UALinux"},"image":{"@id":"https:\/\/linuxthebest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/UserAndLINUX","https:\/\/x.com\/UserAndLINUX","https:\/\/www.linkedin.com\/groups\/7487863\/"]},{"@type":"Person","@id":"https:\/\/linuxthebest.net\/#\/schema\/person\/4ef8b04b8a00956d024e66df7f488c3b","name":"walle9054","image":{"@type":"ImageObject","inLanguage":"uk","@id":"https:\/\/secure.gravatar.com\/avatar\/ca1cd3a0da5794e9defce526252afa41fcd26be7662ae17e81bf6e994b1b2c1d?s=96&d=wavatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ca1cd3a0da5794e9defce526252afa41fcd26be7662ae17e81bf6e994b1b2c1d?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ca1cd3a0da5794e9defce526252afa41fcd26be7662ae17e81bf6e994b1b2c1d?s=96&d=wavatar&r=g","caption":"walle9054"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/metasploit-diesec.jpg?fit=1280%2C600&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p7Dc7N-7zI","jetpack-related-posts":[{"id":29187,"url":"https:\/\/linuxthebest.net\/uk\/yak-vstanoviti-metasploit-framework-na-debian-13-12-11-10\/","url_meta":{"origin":29122,"position":0},"title":"\u042f\u043a \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 Metasploit Framework \u043d\u0430 Debian 13\/12\/11\/10","author":"walle9054","date":"2023-08-18","format":false,"excerpt":"{:ru}Metasploit Framework - \u044d\u0442\u043e \u043d\u0435\u0437\u0430\u043c\u0435\u043d\u0438\u043c\u044b\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0439 \u0441\u0432\u043e\u0438\u043c\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044f\u043c\u0438 \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435 \u0438 \u043e\u0446\u0435\u043d\u043a\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439. \u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043f\u0440\u0438\u0441\u0443\u0449\u0443\u044e Metasploit \u043c\u043e\u0449\u044c, \u043b\u0443\u0447\u0448\u0435 \u0432\u0441\u0435\u0433\u043e \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u0435\u0433\u043e \u043d\u0430 \u0432\u044b\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0438\u043b\u0438 \u0432 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0440\u0435\u0434\u0435. \u042d\u0442\u043e \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0440\u0443\u0435\u0442, \u0447\u0442\u043e \u0432\u0430\u0448\u0438 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0435 \u0437\u0430\u0434\u0430\u0447\u0438 \u0438 \u0432\u0430\u0436\u043d\u044b\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u043e\u0441\u0442\u0430\u043d\u0443\u0442\u0441\u044f \u043d\u0435\u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u043c\u0438. \u0414\u043b\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u043c\u044b \u0431\u0443\u0434\u0435\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c Metasploit Official APT.\u2026","rel":"","context":"\u0423 &quot;\u0418\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438&quot;","block_context":{"text":"\u0418\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438","link":"https:\/\/linuxthebest.net\/uk\/terminal\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/1_dii2_qz3anzwc1tlxnm4ow.jpg?fit=743%2C354&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/1_dii2_qz3anzwc1tlxnm4ow.jpg?fit=743%2C354&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/1_dii2_qz3anzwc1tlxnm4ow.jpg?fit=743%2C354&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/08\/1_dii2_qz3anzwc1tlxnm4ow.jpg?fit=743%2C354&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":7546,"url":"https:\/\/linuxthebest.net\/uk\/kali-linux-v-magazine-windows\/","url_meta":{"origin":29122,"position":1},"title":"Kali Linux \u0432 \u043c\u0430\u0433\u0430\u0437\u0438\u043d\u0435 Windows","author":"UALinux","date":"2018-03-07","format":false,"excerpt":"\u0425\u043e\u0440\u043e\u0448\u0430\u044f \u043d\u043e\u0432\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u0442\u0435\u0445, \u043a\u0442\u043e \u0437\u0430\u043d\u0438\u043c\u0430\u0435\u0442\u0441\u044f \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435, \u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u0445\u0430\u043a\u0435\u0440\u043e\u0432, \u0432\u0435\u0434\u044c \u0442\u0435\u043f\u0435\u0440\u044c \u0438 Kali Linux \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f \u0432 Windows Store. \u0420\u0430\u043d\u0435\u0435 \u0443\u0436\u0435 \u0431\u044b\u043b\u0438 \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u044b \u0442\u0430\u043a\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043a\u0430\u043a:\u00a0Ubuntu,\u00a0SUSE,\u00a0openSUSE\u00a0\u0438\u00a0Arch Linux. \u0410 \u0442\u0435\u043f\u0435\u0440\u044c \u043a \u043d\u0438\u043c \u043f\u0440\u0438\u0441\u043e\u0435\u0434\u0438\u043d\u044f\u0435\u0442\u0441\u044f \u0438 Kali. \u0412 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u043d\u0435\u0434\u0435\u043b\u044c, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0440\u0430\u0431\u043e\u0442\u0430\u043b\u0438 \u0441 \u043a\u043e\u043c\u0430\u043d\u0434\u043e\u0439 Microsoft WSL, \u0447\u0442\u043e\u0431\u044b \u0434\u043e\u0431\u0430\u0432\u0438\u0442\u044c Kali\u2026","rel":"","context":"\u0423 &quot;\u041d\u043e\u0432\u0438\u043d\u0438&quot;","block_context":{"text":"\u041d\u043e\u0432\u0438\u043d\u0438","link":"https:\/\/linuxthebest.net\/uk\/news\/"},"img":{"alt_text":"kali linux","src":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2018\/03\/kali_dragon_by_humanlly-d61ax9j-1024x640.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2018\/03\/kali_dragon_by_humanlly-d61ax9j-1024x640.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2018\/03\/kali_dragon_by_humanlly-d61ax9j-1024x640.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":27918,"url":"https:\/\/linuxthebest.net\/uk\/ustanovka-blackarch-tools-na-arch-linux\/","url_meta":{"origin":29122,"position":2},"title":"\u042f\u043a \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 BlackArch Tools \u043d\u0430 Arch Linux","author":"ViGo","date":"2023-05-18","format":false,"excerpt":"{:ru}BlackArch \u2014 \u044d\u0442\u043e \u043e\u0440\u0438\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 Arch Linux. \u041a\u0430\u043a \u0438 \u0435\u0433\u043e \u0430\u043d\u0430\u043b\u043e\u0433\u0438 \u043d\u0430 \u0431\u0430\u0437\u0435 Debian Kali Linux \u0438 Parrot OS, \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0443\u0442\u0438\u043b\u0438\u0442 \u0434\u043b\u044f \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f. \u0415\u0441\u043b\u0438 \u0432\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0435 Arch Linux \u0438 \u0445\u043e\u0442\u0438\u0442\u0435 \u043f\u0440\u043e\u0432\u0435\u0441\u0442\u0438 \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0432\u044b \u0431\u0443\u0434\u0435\u0442\u0435 \u0440\u0430\u0437\u043e\u0447\u0430\u0440\u043e\u0432\u0430\u043d\u044b, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432, \u0447\u0442\u043e \u0432 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f\u0445 Arch \u043d\u0435\u0442\u2026","rel":"","context":"\u0423 &quot;\u0418\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438&quot;","block_context":{"text":"\u0418\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438","link":"https:\/\/linuxthebest.net\/uk\/terminal\/"},"img":{"alt_text":"BlackArch","src":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/05\/000-1.jpg?fit=1140%2C570&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/05\/000-1.jpg?fit=1140%2C570&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/05\/000-1.jpg?fit=1140%2C570&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/05\/000-1.jpg?fit=1140%2C570&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2023\/05\/000-1.jpg?fit=1140%2C570&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":11505,"url":"https:\/\/linuxthebest.net\/uk\/kali-linux-1-0-7-zagruzka-s-zashifrovannoj-fleshki\/","url_meta":{"origin":29122,"position":3},"title":"Kali Linux 1.0.7 &#8211; \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u0441 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0444\u043b\u044d\u0448\u043a\u0438","author":"ViGo","date":"2014-07-02","format":false,"excerpt":"\u0414\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432 Kali Linux \u043d\u0430 \u0431\u0430\u0437\u0435 Debian \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u043e\u0434\u043d\u0443 \u0438\u0437 \u0441\u0430\u043c\u044b\u0445 \u043f\u043e\u043b\u043d\u044b\u0445 \u043f\u043e\u0434\u0431\u043e\u0440\u043e\u043a \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0434\u043b\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u043e\u0432 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438: \u043e\u0442 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0434\u043b\u044f \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f web-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0438 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0432 \u0431\u0435\u0441\u043f\u0440\u043e\u0432\u043e\u0434\u043d\u044b\u0435 \u0441\u0435\u0442\u0438, \u0434\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0434\u043b\u044f \u0441\u0447\u0438\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445 \u0441 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 RFID \u0447\u0438\u043f\u043e\u0432. \u0422\u0430\u043a\u0436\u0435 \u043e\u043d \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u0435 \u043a\u0440\u0438\u043c\u0438\u043d\u0430\u043b\u0438\u0441\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u0438\u0437 \u0438 \u043e\u0431\u0443\u0447\u0435\u043d\u0438\u044f \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c \u043e\u0441\u043d\u043e\u0432\u0430\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439\u2026","rel":"","context":"\u0423 &quot;\u041d\u043e\u0432\u0438\u043d\u0438&quot;","block_context":{"text":"\u041d\u043e\u0432\u0438\u043d\u0438","link":"https:\/\/linuxthebest.net\/uk\/news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2014\/07\/kali-1.0.7-released-798x284-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2014\/07\/kali-1.0.7-released-798x284-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2014\/07\/kali-1.0.7-released-798x284-1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2014\/07\/kali-1.0.7-released-798x284-1.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":12710,"url":"https:\/\/linuxthebest.net\/uk\/poisk-uyazvimostej-na-sajte\/","url_meta":{"origin":29122,"position":4},"title":"\u041f\u043e\u0438\u0441\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0430 \u0441\u0430\u0439\u0442\u0435","author":"ViGo","date":"2019-08-27","format":false,"excerpt":"\u0422\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u043e\u0448\u0438\u0431\u043a\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0434\u043b\u044f \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0432 \u0432\u0430\u0448\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u0443. \u0415\u0441\u043b\u0438 \u0432\u044b \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440 \u0441\u0430\u0439\u0442\u0430, \u0432\u0430\u043c \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u043d\u0443\u0436\u043d\u043e \u0434\u043e\u0431\u0430\u0432\u0438\u0442\u044c \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435 \u0432 \u0441\u0432\u043e\u0439 \u0441\u043f\u0438\u0441\u043e\u043a \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0438 \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u043e\u0438\u0441\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0434\u043b\u044f \u0442\u043e\u0433\u043e, \u0447\u0442\u043e\u0431\u044b \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u0443\u044e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0432\u0430\u0448\u0438\u0445 \u0441\u0430\u0439\u0442\u043e\u0432. \u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043f\u043e\u043c\u043e\u0433\u0443\u0442 \u0432\u0430\u043c\u2026","rel":"","context":"\u0423 &quot;\u0418\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438&quot;","block_context":{"text":"\u0418\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438","link":"https:\/\/linuxthebest.net\/uk\/terminal\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/losst.ru\/wp-content\/uploads\/2017\/01\/Screen-Shot-2015-12-05-at-1.07.22-PM.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/losst.ru\/wp-content\/uploads\/2017\/01\/Screen-Shot-2015-12-05-at-1.07.22-PM.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/losst.ru\/wp-content\/uploads\/2017\/01\/Screen-Shot-2015-12-05-at-1.07.22-PM.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/losst.ru\/wp-content\/uploads\/2017\/01\/Screen-Shot-2015-12-05-at-1.07.22-PM.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":12523,"url":"https:\/\/linuxthebest.net\/uk\/ataki-na-setevoe-oborudovanie-s-kali-linux\/","url_meta":{"origin":29122,"position":5},"title":"\u0410\u0442\u0430\u043a\u0438 \u043d\u0430 \u0441\u0435\u0442\u0435\u0432\u043e\u0435 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u0441 Kali Linux","author":"ViGo","date":"2017-08-25","format":false,"excerpt":"\u0412 \u0434\u0430\u043d\u043d\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u043c\u044b \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0438\u043c \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0441\u0435\u0442\u0435\u0432\u043e\u0435 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u0432 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u043c \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u0435 Kali Linux \u0434\u043b\u044f \u0438\u0445 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f. \u0410\u0442\u0430\u043a\u0443\u0435\u043c CISCO \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440 \u0412 \u0441\u043e\u0441\u0442\u0430\u0432 Kali Linux \u0432\u0445\u043e\u0434\u0438\u0442 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0430\u0443\u0434\u0438\u0442\u0430 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f CISCO. \u0421\u043f\u0438\u0441\u043e\u043a \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c \u0432 \u0440\u0430\u0437\u0434\u0435\u043b\u0435 Vulnerability Analysis \u2014 Cisco Tools: Cisco Audit\u2026","rel":"","context":"\u0423 &quot;\u0418\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438&quot;","block_context":{"text":"\u0418\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438","link":"https:\/\/linuxthebest.net\/uk\/terminal\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2020\/08\/Descargue-Kali-Linux-2018.2-con-nuevas-funciones-de-s.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2020\/08\/Descargue-Kali-Linux-2018.2-con-nuevas-funciones-de-s.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/linuxthebest.net\/wp-content\/uploads\/2020\/08\/Descargue-Kali-Linux-2018.2-con-nuevas-funciones-de-s.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/linuxthebest.net\/uk\/wp-json\/wp\/v2\/posts\/29122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/linuxthebest.net\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/linuxthebest.net\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/linuxthebest.net\/uk\/wp-json\/wp\/v2\/users\/3227"}],"replies":[{"embeddable":true,"href":"https:\/\/linuxthebest.net\/uk\/wp-json\/wp\/v2\/comments?post=29122"}],"version-history":[{"count":2,"href":"https:\/\/linuxthebest.net\/uk\/wp-json\/wp\/v2\/posts\/29122\/revisions"}],"predecessor-version":[{"id":29129,"href":"https:\/\/linuxthebest.net\/uk\/wp-json\/wp\/v2\/posts\/29122\/revisions\/29129"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/linuxthebest.net\/uk\/wp-json\/wp\/v2\/media\/29123"}],"wp:attachment":[{"href":"https:\/\/linuxthebest.net\/uk\/wp-json\/wp\/v2\/media?parent=29122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/linuxthebest.net\/uk\/wp-json\/wp\/v2\/categories?post=29122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/linuxthebest.net\/uk\/wp-json\/wp\/v2\/tags?post=29122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}