Install & Activation Metasploit Pro in windows

Step 1:- Open Link And Fill Details As Follow. "Read And Select Agreement" And Then Click On "Submit" Button.


Step 2:- Select Windows "64 bit". The Metasploit File Will Starting.

 

Step 3:- Now Open Your Email, You Will Get "Product Key".




Step 4:- After You Download The Installer, Locate The File And "Double Click" The Installer Icon To Start The Installation Process.
When the Setup screen appears, click Next to continue.

 
Step 5:- Read The "License Agreement" And Select The "I Accept" The License Agreement Option. Click Next To Continue.
 
 
Step 6:- "Browse To The Location" Where You Want To Install The Metasploit Framework. By Default, The Framework Is Installed On The "C:\ Metasploit-framework" Directory. Click Next To Continue.

 


Step 7:- Click On "Next Button".


Step 8:- Click On "Next Button".


Step 9:- Click On "Next Button".

 
It Will Take Some Time To Load "Metasploit".
 


Step 10:- Click On "Finish Button".


Step 11:- Search "Metasploit Console" And Click On It.
    It Will Take Some Time To Open And Load "All Plugin".



Step 12:- Now You Can See Your "Metasploit Console" Is Running Up In Your System.



ACTIVATION

Step 13:- Open "Web Browser" Type "http://localhost:3790/". 
Enter Data In The Following Required Fields: "Username*" , "Password*" and "Password confirmation*", And Then Click On "Create Account".
 
 
Step 14:- Once Your Account Created, You Can Press The "GET PRODUCT KEY" Button. 
You Will Be Redirected To Rapid7’s Web Page, Where You Will Be Asked To Fill Out A Form In Order To Receive Your Product Key. 
Once You "Receive Your Key", Or If You Already Have A Key, Entered It Where Is Says "Enter Product Key You’ve Received By Email", And Press "ACTIVATE LICENCE".


Step 15:- Congratulations!!! 
You Have Successfully Activated Your Copy Of Metasploit Community Edition.

Comments

Popular posts from this blog

OSINT Tool in Termux

Active Directory Ransomware Attacks

Colt Telecom Hit by WarLock Ransomware: SharePoint Zero Day Used for Mass Data Theft