zoukankan      html  css  js  c++  java
  • metasploit 中的DB

    渗透测试任务中,主机/服务/漏洞等信息如果手动维护,会带来巨大的工作量。

    在metasploit中,这部分工作已经被封装的非常好,每次调用内部模块执行的任务结果都会自动存入DB.通过简单的指令即可以方便的查看。

    metasploit 中的DB操作

    msf > help database
    
    Database Backend Commands
    =========================
    
        Command        Description
        -------        -----------
        creds          List all credentials in the database
        db_connect     Connect to an existing database
        db_disconnect  Disconnect from the current database instance
        db_export      Export a file containing the contents of the database
        db_import      Import a scan result file (filetype will be auto-detected)
        db_nmap        Executes nmap and records the output automatically
        db_status      Show the current database status
        hosts          List all hosts in the database
        loot           List all loot in the database
        notes          List all notes in the database
        services       List all services in the database
        vulns          List all vulnerabilities in the database
        workspace      Switch between database workspaces
    msf auxiliary(ssh_version) > show options

    Module options (auxiliary/scanner/ssh/ssh_version):

       Name     Current Setting                        Required  Description
       ----     ---------------                        --------  -----------
       RHOSTS   file:/root/DailyPentest/IPSrc/example  yes       The target address range or CIDR identifier
       RPORT    22                                     yes       The target port
       THREADS  1                                      yes       The number of concurrent threads
       TIMEOUT  30                                     yes       Timeout for the SSH probe

    msf auxiliary(ssh_version) > set RHOSTS file:/root/DailyPentest/IPSrc/aa
    RHOSTS => file:/root/DailyPentest/IPSrc/aa
    msf auxiliary(ssh_version) > run

    [*] 124.127.106.5:22, SSH server version: SSH-1.99-OpenSSH_5.8p2
    [*] Scanned 1 of 9 hosts (011% complete)
    [*] 124.127.106.3:22, SSH server version: SSH-1.99-OpenSSH_3.9p1
    [*] Scanned 2 of 9 hosts (022% complete)
    [*] Scanned 3 of 9 hosts (033% complete)
    [*] Scanned 4 of 9 hosts (044% complete)
    [*] Scanned 5 of 9 hosts (055% complete)
    [*] Scanned 6 of 9 hosts (066% complete)
    [*] Scanned 7 of 9 hosts (077% complete)
    [*] 167.124.236.145:22, SSH server version: SSH-2.0-ArrayOS
    [*] Scanned 8 of 9 hosts (088% complete)
    [-] 167.124.236.184:22, SSH server version detection failed!
    [*] Scanned 9 of 9 hosts (100% complete)
    [*] Auxiliary module execution completed
    msf auxiliary(ssh_version) > services

    Services
    ========

    host             port  proto  name          state  info
    ----             ----  -----  ----          -----  ----
    167.124.236.145  22    tcp    ssh           open   SSH-2.0-ArrayOS
    167.124.236.243  22    tcp    ssh           open   SSH-2.0-ArrayOS
    124.127.106.3    22    tcp    ssh           open   SSH-1.99-OpenSSH_3.9p1
    124.127.106.5    22    tcp    ssh           open   SSH-1.99-OpenSSH_5.8p2
    192.168.0.104    135   tcp    msrpc         open   
    192.168.0.104    554   tcp    rtsp          open   
    192.168.0.104    445   tcp    microsoft-ds  open   Windows 7 Ultimate 7601 Service Pack (Build 1) (language: Unknown) (name:WIN-R2OU7BR820S) (domain:WORKGROUP)
    192.168.0.104    139   tcp    netbios-ssn   open   
    192.168.0.105    21    tcp    ftp           open   220 (vsFTPd 2.0.6)x0dx0a
    192.168.0.105    22    tcp    ssh           open   SSH-2.0-OpenSSH_4.7p1 Debian-8
    192.168.0.105    631   tcp    ipp           open   

    msf auxiliary(ssh_version) > services -p 22

    Services
    ========

    host             port  proto  name  state  info
    ----             ----  -----  ----  -----  ----
    167.124.236.145  22    tcp    ssh   open   SSH-2.0-ArrayOS
    167.124.236.243  22    tcp    ssh   open   SSH-2.0-ArrayOS
    124.127.106.3    22    tcp    ssh   open   SSH-1.99-OpenSSH_3.9p1
    124.127.106.5    22    tcp    ssh   open   SSH-1.99-OpenSSH_5.8p2
    192.168.0.105    22    tcp    ssh   open   SSH-2.0-OpenSSH_4.7p1 Debian-8



     可以用db_nmap 取代nmap, 因为其结果会直接导入DB, 可以及其方便的用指令查看

    msf > services -R 192.168.0.105
    
    Services
    ========
    
    host           port  proto  name  state  info
    ----           ----  -----  ----  -----  ----
    192.168.0.105  21    tcp    ftp   open   220 (vsFTPd 2.0.6)x0dx0a
    192.168.0.105  22    tcp    ssh   open   SSH-2.0-OpenSSH_4.7p1 Debian-8
    192.168.0.105  631   tcp    ipp   open   
    
    RHOSTS => 192.168.0.105
    
    msf > services -p 21
    
    Services
    ========
    
    host           port  proto  name  state  info
    ----           ----  -----  ----  -----  ----
    192.168.0.105  21    tcp    ftp   open   220 (vsFTPd 2.0.6)x0dx0a
  • 相关阅读:
    赫夫曼树编码
    根据先序和中序实现后序
    C++语言实现开心消消乐
    C语言风格实现的开心消消乐
    动态规划
    leetcode dp wordbreakII
    欧拉回路
    欧拉通路是否存在
    Python|多任务:线程、进程、协程--你想要的都在这里
    网络通信:socket、udp与tcp
  • 原文地址:https://www.cnblogs.com/vigarbuaa/p/3506356.html
Copyright © 2011-2022 走看看