zoukankan      html  css  js  c++  java
  • 使用Metasploit进行端口扫描

    Metasploit中不仅能够使用第三方扫描器Nmap等,在其辅助模块中也包含了几款内建的端口扫描器。

    查看Metasploit框架提供的端口扫描工具:

    msf > search portscan
    
    Matching Modules
    ================
    
       Name                                              Disclosure Date  Rank    Description
       ----                                              ---------------  ----    -----------
       auxiliary/scanner/http/wordpress_pingback_access                   normal  Wordpress Pingback Locator
       auxiliary/scanner/natpmp/natpmp_portscan                           normal  NAT-PMP External Port Scanner
       auxiliary/scanner/portscan/ack                                     normal  TCP ACK Firewall Scanner
       auxiliary/scanner/portscan/ftpbounce                               normal  FTP Bounce Port Scanner
       auxiliary/scanner/portscan/syn                                     normal  TCP SYN Port Scanner
       auxiliary/scanner/portscan/tcp                                     normal  TCP Port Scanner
       auxiliary/scanner/portscan/xmas                                    normal  TCP "XMas" Port Scanner
    

     使用Metasploit的SYN端口扫描器对单个主机进行一次简单的扫描:

    msf > use scanner/portscan/syn
    

      设定RHOST参数为192.168.119.132,线程数为50

    RHOSTS => 192.168.119.132
    msf  auxiliary(syn) > set THREADS 50
    THREADS => 50
    msf  auxiliary(syn) > run
    
    [*]  TCP OPEN 192.168.119.132:80
    [*]  TCP OPEN 192.168.119.132:135
    [*]  TCP OPEN 192.168.119.132:139
    [*]  TCP OPEN 192.168.119.132:1433
    [*]  TCP OPEN 192.168.119.132:2383
    [*]  TCP OPEN 192.168.119.132:3306
    [*]  TCP OPEN 192.168.119.132:3389
    [*] Scanned 1 of 1 hosts (100% complete)
    [*] Auxiliary module execution completed
    

      

    若非特别声明,文章均为Evilxr的个人笔记,转载请注明出处。
  • 相关阅读:
    洛谷 P1022.计算器的改良
    洛谷 P1014.Cantor表
    洛谷 P1464.Function
    洛谷 P1426.小鱼会有危险吗
    洛谷 P2089.烤鸡
    洛谷 P1579.哥德巴赫猜想(升级版)
    洛谷 P1618.三连击(升级版)
    通过ES6写法去对Redux部分源码解读
    闲谈Hybrid
    浅谈React、Vue 部分异步
  • 原文地址:https://www.cnblogs.com/evilxr/p/3840593.html
Copyright © 2011-2022 走看看