《Metasploit 5.0 for beginners》读书笔记 chp4 information gathing and enumeration on various protocols 1

编程入门 行业动态 更新时间:2024-10-28 18:29:06

The following software is required:
The Metasploit Framework
Metasploitable 2
Shodan


information gathing and enumeration on various protocols

1.transmission control protocol( TCP ):
use auxiliary/scanner/portscan/tcp


2.user datagram protocol( UDP )
use auxiliary/scanner/discovery/udp_sweep


3.file tranfer protocol( FTP ):
 1)ftp_login:this module helps us perform a brute-force attack against the target ftp server
 the module name is :auxiliary/scanner/ftp/ftp_login
 you will have toconfigure the following parameters:
 RHOSTS: IP address or IP range of the target to be scanned
 USERPASS_FILE: Path to the file containing the username/password list

 2)ftp_version:
 module name is auxiliary/scanner/ftp/ftp_version
 you will have to configure the following parameters:
 RHOSTS: IP address or IP range of the target to be scanned

 3)anonymous:
 the module name is auxiliary/scanner/ftp/anonymous
 you will have toconfigure the following parameters:
 RHOSTS: IP address or IP range of the target to be scanned


更多推荐

《Metasploit 5.0 for beginners》读书笔记 chp4 information gathing and enumeration on v

本文发布于:2023-06-14 09:20:00,感谢您对本站的认可!
本文链接:https://www.elefans.com/category/jswz/34/1460075.html
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。
本文标签:读书笔记   beginners   Metasploit   enumeration   protocols

发布评论

评论列表 (有 0 条评论)
草根站长

>www.elefans.com

编程频道|电子爱好者 - 技术资讯及电子产品介绍!