Port Scanning
metasploit has several port scanners built into its auxiliary mocules that directly integrate with most aspects of the Framework. Lets conduct a simple scan of a single host using metasploit's SYN Port Scanner.
msf > use auxiliary/scanner/portscan/syn
msf auxiliary(syn) > show options
Module options (auxiliary/scanner/portscan/syn):
Name Current Setting Required Description
---- --------------- -------- -----------
BATCHSIZE 256 yes The number of hosts to scan per set
INTERFACE no The name of the interface
PORTS 1-10000 yes Ports to scan (e.g. 22-25,80,110-900)
RHOSTS yes The target address range or CIDR identifier
SNAPLEN 65535 yes The number of bytes to capture
THREADS 1 yes The number of concurrent threads
TIMEOUT 500 yes The reply read timeout in milliseconds
msf auxiliary(syn) > set RHOSTS 192.168.56.101
RHOSTS => 192.168.56.101
msf auxiliary(syn) > set THREADS 50
THREADS => 50
msf auxiliary(syn) > run
[-] Auxiliary failed: RuntimeError eth0: no IPv4 address assigned
[-] Call stack:
[-] /opt/framework/msf3/lib/msf/core/exploit/capture.rb:108:in `setfilter'
[-] /opt/framework/msf3/lib/msf/core/exploit/capture.rb:108:in `open_pcap'
[-] /opt/framework/msf3/modules/auxiliary/scanner/portscan/syn.rb:51:in `run_batch'
[-] /opt/framework/msf3/lib/msf/core/auxiliary/scanner.rb:162:in `block in run'
[-] /opt/framework/msf3/lib/msf/core/thread_manager.rb:64:in `call'
[-] /opt/framework/msf3/lib/msf/core/thread_manager.rb:64:in `block in spawn'
[*] Auxiliary module execution completed
Tidak ada komentar:
Posting Komentar