官术网_书友最值得收藏!

Auxiliaries

The Metasploit framework is equipped with hundreds of auxiliaries that can be used to perform different tasks. These modules can be considered as small tools that do not exploit anything but aid us in the exploitation process. To view a list of all the auxiliaries, we can use the following command:

show auxiliary

We will look at an example of running an auxiliary that runs a version scan on the SMB service and tells us the OS that is installed on the system we ran the auxiliary on. To choose the auxiliary, we type in the following command:

use auxiliary/scanner/smb/smb_ms17_101  

We can see more information about what this auxiliary does by typing the following:

show info

Now we can see the options to check all the requirements of this auxiliary by inputting the following:

show options 

Here, we can see that this auxiliary requires the value of the remote host of RHOSTS and the number of threads. This can be increased if we plan to use this across a subnet. We set the value of RHOSTS by using the following command:

 set RHOSTS <IP HERE>

We then run the auxiliary and this will show us whether the system is vulnerable to Eternal Blue and Eternal Romance, as well as whether it is already backdoored:

主站蜘蛛池模板: 防城港市| 洱源县| 古蔺县| 九寨沟县| 香格里拉县| 辽阳县| 乌拉特后旗| 白城市| 长武县| 长宁县| 岳阳县| 济源市| 垣曲县| 青神县| 青浦区| 景谷| 忻城县| 定襄县| 邵阳市| 昭苏县| 维西| 南京市| 宁德市| 博野县| 永泰县| 开封市| 仁寿县| 津市市| 义马市| 上思县| 棋牌| 额尔古纳市| 水富县| 阿克陶县| 盖州市| 城市| 色达县| 普定县| 洪湖市| 兴山县| 保德县|