切换风格

Wizard Sky California Sunset glow Black Cloud Beige Dragon Lavender NewYear City Snow Flowers London
收藏本站XSS平台字符串转换jsfuck
135 网络扫描 信息探测之Metasploit 端口探测[复制链接]
发表于 2012-9-9 22:10:59 | 显示全部楼层 |!read_mode!
  1. msf > use auxiliary/scanner/portscan/(输入两下TAB键盘键)
  2. use auxiliary/scanner/portscan/ack        use auxiliary/scanner/portscan/tcp
  3. use auxiliary/scanner/portscan/ftpbounce  use auxiliary/scanner/portscan/xmas
  4. use auxiliary/scanner/portscan/syn  
复制代码
其实关于网络扫描在于你扫描的办法 ACK攻击不行换UDP,UDP不行换SYN TCP等等
举例子 一个:
  1. msf > use auxiliary/scanner/portscan/ack
  2. msf  auxiliary(ack) > show options

  3. Module options (auxiliary/scanner/portscan/ack):

  4.    Name       Current Setting  Required  Description
  5.    ----       ---------------  --------  -----------
  6.    BATCHSIZE  256              yes       The number of hosts to scan per set
  7.    INTERFACE                   no        The name of the interface
  8.    PORTS      1-10000          yes       Ports to scan (e.g. 22-25,80,110-900)
  9.    RHOSTS                      yes       The target address range or CIDR identifier
  10.    SNAPLEN    65535            yes       The number of bytes to capture
  11.    THREADS    1                yes       The number of concurrent threads
  12.    TIMEOUT    500              yes       The reply read timeout in milliseconds

  13. msf  auxiliary(ack) >
复制代码
msf auxiliary(ack) > set TIMEOUT 1000 超时,如果是扫老外的设置大点 默认500
msf auxiliary(ack) > set RHOSTS 100 线程 一般设置500 我设置100
msf auxiliary(ack) > set INTERFACE eth0 网卡,如果你有很多网卡的话..
msf auxiliary(ack) > set PORTS 1-60000 范围 不解释
  1. msf  auxiliary(ack) > set RHOSTS 192.168.40.129
  2. RHOSTS => 192.168.40.129
  3. msf  auxiliary(ack) > exploit

  4. [*] The Pcaprub module is not available: no such file to load -- pcaprub
  5. [-] Auxiliary failed: RuntimeError Pcaprub not available
  6. [-] Call stack:
  7. [-]   /pen/msf3/lib/msf/core/exploit/capture.rb:376:in `check_pcaprub_loaded'
  8. [-]   /pen/msf3/lib/msf/core/exploit/capture.rb:75:in `open_pcap'
  9. [-]   /pen/msf3/modules/auxiliary/scanner/portscan/ack.rb:53:in `run_batch'
  10. [-]   /pen/msf3/lib/msf/core/auxiliary/scanner.rb:163:in `block in run'
  11. [-]   /pen/msf3/lib/msf/core/thread_manager.rb:99:in `call'
  12. [-]   /pen/msf3/lib/msf/core/thread_manager.rb:99:in `block in spawn'
  13. [*] Auxiliary module execution completed
  14. msf  auxiliary(ack) >
复制代码
嗯 出错了 装pcaprub
  1. msf  auxiliary(ack) > save
复制代码
保存当前配置 再输入EXTI退出
  1. root@Dis9Team:~/.msf4/logs# gem install pcaprub
  2. Building native extensions.  This could take a while...
  3. Successfully installed pcaprub-0.11.2
  4. 1 gem installed
  5. Installing ri documentation for pcaprub-0.11.2...
  6. Installing RDoc documentation for pcaprub-0.11.2...
  7. root@Dis9Team:~/.msf4/logs#
复制代码
继续 启动MSF
启动了就在退出的那地方 直接输入run


  1. msf  auxiliary(ack) > exploit
复制代码
等待结果



操千曲而后晓声,观千剑而后识器。
发表于 2016-2-23 17:46:13 | 显示全部楼层
扫描是基本功

代码区

GMT+8, 2020-10-1 20:11

Powered by Discuz! X2

© 2001-2018 Comsenz Inc.

回顶部