The following software is required:
The Metasploit Framework
Metasploitable 2
Shodan
information gathing and enumeration on various protocols
1.transmission control protocol( TCP ):
use auxiliary/scanner/portscan/tcp
2.user datagram protocol( UDP )
use auxiliary/scanner/discovery/udp_sweep
3.file tranfer protocol( FTP ):
1)ftp_login:this module helps us perform a brute-force attack against the target ftp server
the module name is :auxiliary/scanner/ftp/ftp_login
you will have toconfigure the following parameters:
RHOSTS: IP address or IP range of the target to be scanned
USERPASS_FILE: Path to the file containing the username/password list
2)ftp_version:
module name is auxiliary/scanner/ftp/ftp_version
you will have to configure the following parameters:
RHOSTS: IP address or IP range of the target to be scanned
3)anonymous:
the module name is auxiliary/scanner/ftp/anonymous
you will have toconfigure the following parameters:
RHOSTS: IP address or IP range of the target to be scanned
更多推荐
《Metasploit 5.0 for beginners》读书笔记 chp4 information gathing and enumeration on v
发布评论