zoukankan      html  css  js  c++  java
  • metasploit

    msf > use scanner/portscan/syn
    msf  auxiliary(syn) > set RHOSTS 192.168.0.101
    RHOSTS => 192.168.0.101
    msf  auxiliary(syn) > set THREADS 50
    THREADS => 50
    msf  auxiliary(syn) > run
    [-] Auxiliary failed: RuntimeError eth0: no IPv4 address assigned
    [-] Call stack:
    [-]   /opt/metasploit-4.4.0/msf3/lib/msf/core/exploit/capture.rb:113:in `setfilter'
    [-]   /opt/metasploit-4.4.0/msf3/lib/msf/core/exploit/capture.rb:113:in `open_pcap'
    [-]   /opt/metasploit-4.4.0/msf3/modules/auxiliary/scanner/portscan/syn.rb:51:in `run_batch'
    [-]   /opt/metasploit-4.4.0/msf3/lib/msf/core/auxiliary/scanner.rb:164:in `block in run'
    [-]   /opt/metasploit-4.4.0/msf3/lib/msf/core/thread_manager.rb:100:in `call'
    [-]   /opt/metasploit-4.4.0/msf3/lib/msf/core/thread_manager.rb:100:in `block in spawn'
    [*] Auxiliary module execution completed

    refer to document: http://seclists.org/metasploit/2010/q3/359

    msf  auxiliary(syn) > show options
    
    Module options (auxiliary/scanner/portscan/syn):
    
       Name       Current Setting  Required  Description
       ----       ---------------  --------  -----------
       BATCHSIZE  256              yes       The number of hosts to scan per set
       INTERFACE                   no        The name of the interface
       PORTS      1-10000          yes       Ports to scan (e.g. 22-25,80,110-900)
       RHOSTS     192.168.0.101    yes       The target address range or CIDR identifier
       SNAPLEN    65535            yes       The number of bytes to capture
       THREADS    50               yes       The number of concurrent threads
       TIMEOUT    500              yes       The reply read timeout in milliseconds
    
    msf  auxiliary(syn) > set INTERFACE wlan0
    INTERFACE => wlan0
    msf  auxiliary(syn) > run
    
    [*]  TCP OPEN 192.168.0.101:135
    [*]  TCP OPEN 192.168.0.101:139
    [*]  TCP OPEN 192.168.0.101:445
    [*]  TCP OPEN 192.168.0.101:1025
    [*]  TCP OPEN 192.168.0.101:1026
    [*]  TCP OPEN 192.168.0.101:1029
    [*]  TCP OPEN 192.168.0.101:1030
    [*]  TCP OPEN 192.168.0.101:1032
    [*]  TCP OPEN 192.168.0.101:1035
    [*]  TCP OPEN 192.168.0.101:1036
    [*]  TCP OPEN 192.168.0.101:3306
    [*]  TCP OPEN 192.168.0.101:5357
    [*] Scanned 1 of 1 hosts (100% complete)
    [*] Auxiliary module execution completed
  • 相关阅读:
    剑指offer[30]——连续子数组的最大和
    移动端数据爬取
    Scrapy框架基础应用和持久化存储
    爬虫的验证码处理,图片懒加载,selenium和 PhantomJS,requests模块的session,线程池
    爬虫之数据解析(bs4,Xpath)
    爬虫之jupyter的使用,requests模块,正则表达式
    git的分支,多人协作,标签管理
    git 的基础
    利用python操作excel表
    nginx基于uwsgi部署Django
  • 原文地址:https://www.cnblogs.com/vigarbuaa/p/2713126.html
Copyright © 2011-2022 走看看