Daftar Blog Saya

Senin, 27 Februari 2012

Example Using Auxiliary Module

Port Scanning
metasploit has several port scanners built into its auxiliary mocules that directly integrate with most aspects of the Framework. Lets conduct a simple scan of a single host using metasploit's SYN Port Scanner.

msf > use auxiliary/scanner/portscan/syn
msf  auxiliary(syn) > show options

Module options (auxiliary/scanner/portscan/syn):

   Name       Current        Setting  Required  Description
   ----       ---------------  --------  -----------
   BATCHSIZE  256           yes       The number of hosts to scan per set
   INTERFACE                   no        The name of the interface
   PORTS      1-10000        yes       Ports to scan (e.g. 22-25,80,110-900)
   RHOSTS                         yes       The target address range or CIDR identifier
   SNAPLEN    65535        yes       The number of bytes to capture
   THREADS    1                yes       The number of concurrent threads
   TIMEOUT    500             yes      The reply read timeout in milliseconds

msf  auxiliary(syn) > set RHOSTS 192.168.56.101
RHOSTS => 192.168.56.101
msf  auxiliary(syn) > set THREADS 50
THREADS => 50
msf  auxiliary(syn) > run

[-] Auxiliary failed: RuntimeError eth0: no IPv4 address assigned
[-] Call stack:
[-]   /opt/framework/msf3/lib/msf/core/exploit/capture.rb:108:in `setfilter'
[-]   /opt/framework/msf3/lib/msf/core/exploit/capture.rb:108:in `open_pcap'
[-]   /opt/framework/msf3/modules/auxiliary/scanner/portscan/syn.rb:51:in `run_batch'
[-]   /opt/framework/msf3/lib/msf/core/auxiliary/scanner.rb:162:in `block in run'
[-]   /opt/framework/msf3/lib/msf/core/thread_manager.rb:64:in `call'
[-]   /opt/framework/msf3/lib/msf/core/thread_manager.rb:64:in `block in spawn'
[*] Auxiliary module execution completed

Tidak ada komentar:

Posting Komentar