官术网_书友最值得收藏!

Auxiliaries

The Metasploit framework is equipped with hundreds of auxiliaries that can be used to perform different tasks. These modules can be considered as small tools that do not exploit anything but aid us in the exploitation process. To view a list of all the auxiliaries, we can use the following command:

show auxiliary

We will look at an example of running an auxiliary that runs a version scan on the SMB service and tells us the OS that is installed on the system we ran the auxiliary on. To choose the auxiliary, we type in the following command:

use auxiliary/scanner/smb/smb_ms17_101  

We can see more information about what this auxiliary does by typing the following:

show info

Now we can see the options to check all the requirements of this auxiliary by inputting the following:

show options 

Here, we can see that this auxiliary requires the value of the remote host of RHOSTS and the number of threads. This can be increased if we plan to use this across a subnet. We set the value of RHOSTS by using the following command:

 set RHOSTS <IP HERE>

We then run the auxiliary and this will show us whether the system is vulnerable to Eternal Blue and Eternal Romance, as well as whether it is already backdoored:

主站蜘蛛池模板: 张家港市| 从江县| 广州市| 剑河县| 宜兴市| 阿尔山市| 黑水县| 康马县| 伊金霍洛旗| 丰顺县| 龙州县| 石家庄市| 珠海市| 冷水江市| 三江| 玛沁县| 八宿县| 广汉市| 平泉县| 文水县| 读书| 广元市| 深水埗区| 荆州市| 泊头市| 黄大仙区| 青浦区| 南乐县| 贵州省| 杭锦旗| 丰县| 包头市| 崇礼县| 综艺| 祁连县| 伊春市| 肇源县| 玉屏| 平昌县| 娄底市| 民县|