官术网_书友最值得收藏!

Auxiliaries

The Metasploit framework is equipped with hundreds of auxiliaries that can be used to perform different tasks. These modules can be considered as small tools that do not exploit anything but aid us in the exploitation process. To view a list of all the auxiliaries, we can use the following command:

show auxiliary

We will look at an example of running an auxiliary that runs a version scan on the SMB service and tells us the OS that is installed on the system we ran the auxiliary on. To choose the auxiliary, we type in the following command:

use auxiliary/scanner/smb/smb_ms17_101  

We can see more information about what this auxiliary does by typing the following:

show info

Now we can see the options to check all the requirements of this auxiliary by inputting the following:

show options 

Here, we can see that this auxiliary requires the value of the remote host of RHOSTS and the number of threads. This can be increased if we plan to use this across a subnet. We set the value of RHOSTS by using the following command:

 set RHOSTS <IP HERE>

We then run the auxiliary and this will show us whether the system is vulnerable to Eternal Blue and Eternal Romance, as well as whether it is already backdoored:

主站蜘蛛池模板: 海阳市| 正阳县| 峡江县| 许昌市| 二手房| 冷水江市| 高清| 汉阴县| 新丰县| 昌黎县| 博白县| 格尔木市| 鹰潭市| 白玉县| 蓝田县| 大化| 琼海市| 壶关县| 邮箱| 南陵县| 葵青区| 普洱| 南靖县| 台前县| 曲沃县| 镇江市| 康平县| 镇宁| 博白县| 平顺县| 温宿县| 侯马市| 东兴市| 灵丘县| 尼玛县| 金华市| 民和| 通城县| 高台县| 栖霞市| 都江堰市|