官术网_书友最值得收藏!

Auxiliaries

The Metasploit framework is equipped with hundreds of auxiliaries that can be used to perform different tasks. These modules can be considered as small tools that do not exploit anything but aid us in the exploitation process. To view a list of all the auxiliaries, we can use the following command:

show auxiliary

We will look at an example of running an auxiliary that runs a version scan on the SMB service and tells us the OS that is installed on the system we ran the auxiliary on. To choose the auxiliary, we type in the following command:

use auxiliary/scanner/smb/smb_ms17_101  

We can see more information about what this auxiliary does by typing the following:

show info

Now we can see the options to check all the requirements of this auxiliary by inputting the following:

show options 

Here, we can see that this auxiliary requires the value of the remote host of RHOSTS and the number of threads. This can be increased if we plan to use this across a subnet. We set the value of RHOSTS by using the following command:

 set RHOSTS <IP HERE>

We then run the auxiliary and this will show us whether the system is vulnerable to Eternal Blue and Eternal Romance, as well as whether it is already backdoored:

主站蜘蛛池模板: 德格县| 龙州县| 安新县| 石首市| 天门市| 邵武市| 江西省| 睢宁县| 星座| 错那县| 莱芜市| 怀来县| 沅陵县| 莒南县| 从化市| 高平市| 黔江区| 和政县| 珲春市| 施甸县| 太仓市| 武汉市| 新和县| 青浦区| 随州市| 泽普县| 宁晋县| 新郑市| 高邑县| 手机| 虎林市| 泰和县| 湖南省| 双峰县| 长岛县| 淅川县| 会同县| 临朐县| 东港市| 宝清县| 三河市|