Skip to content

msf aux scans

lethanhtung01011980 edited this page Dec 24, 2019 · 7 revisions

Goals

  • Protocol enumeration, port scanning, fuzzing, sniffing...

Commands

  • show auxiliary
  • set THREADS 10
  • set RHOSTS 10.0.0.1-254

Common scanners

  • use auxiliary/scanner/smb/smb_ms17_010
  • use auxiliary/scanner/smb/smb_version
  • use auxiliary/scanner/ftp/anonymous
  • use auxiliary/scanner/http/webdav_scanner

Brute force

  • use auxiliary/scanner/ftp/ftp_login

Host info

  • To display host database: hosts
  • db_nmap [nmap options] db_nmap 10.x.x.x-254

Search database info

  • services -p port_number
  • services -p 443 --rhosts (To use current RHOSTS)
  • Output to file: RHOSTS => file:/tmp/msf-db-rhosts-20131224-29724-iraymn

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally