当前位置:网站首页>Intranet information collection of Intranet penetration (4)
Intranet information collection of Intranet penetration (4)
2022-07-06 14:17:00 【Unknown white hat】
Catalog
Metasploit Intranet information collection
12 Service scanning and checking
Metasploit Intranet information collection
attack kali 192.168.0.103
Drone aircraft win7 192.168.0.105
09scraper
run scraper( Collect the common information on the target machine, download and save it locally )
/root/.msf4/logs/scripts/scraper

09winenum
run winenum( Collect some current systems , User group related information )
/root/.msf4/logs/scripts/winenum

10msf The host found
The module is located in the source code path modules/auxiliary/scanner/discovery/
There are mainly :
arp_sweep
ipv6_mulitcast_ping
ipv6_neighbor
ipv6_neighbor_router_advertisement
udp_probe
udp_sweep
11msf Port scanning
msf> search portscan
auxiliary/scanner/portscan/ack // adopt ACK Scan the way on the firewall is not shielded port detection
auxiliary/scanner/portscan/ftpbounce // adopt FTP bounce The principle of attack is right TCP Services , Some new software can prevent this attack well , But it can still be used on the old system
auxiliary/scanner/portscan/syn // Use send TCP SYN Flag to detect open ports
auxiliary/scanner/portscan/tcp // Through a complete TCP Connect to determine whether the port is open , The most accurate but the slowest
auxiliary/scanner/portscan/xmas // A more secretive scanning method , By sending FIN·PSH·URG sign , Can avoid some advanced TCP Filtering of tag detector
In general, it is recommended to use syn Port scanner · Faster · The results are accurate · Not easy to be noticed by the other party
syn The use of scanners
use auxiliary/scanner/portscan/syn
set rhosts 192.168.0.105/24
set threads 20
exploit
12 Service scanning and checking
After determining the open port , Mining the service information running on the corresponding port
stay Metasploit Of Scanner In auxiliary module , Tools for service scanning and enumeration are often used in [service_name]_version and [service_name]_login name
[service_name]_version It can be used to traverse hosts that contain certain services in the network , And further determine the version of the service
[service_name]_login Password detection attacks can be carried out on certain services
stay msf The terminal can input
search name:_version
View all available service enumeration modules
边栏推荐
- Matlab opens M file garbled solution
- Yugu p1012 spelling +p1019 word Solitaire (string)
- Attack and defense world misc practice area (GIF lift table ext3)
- HackMyvm靶机系列(1)-webmaster
- Strengthen basic learning records
- "Gold, silver and four" job hopping needs to be cautious. Can an article solve the interview?
- Low income from doing we media? 90% of people make mistakes in these three points
- Attach the simplified sample database to the SQLSERVER database instance
- HackMyvm靶机系列(6)-videoclub
- Intensive literature reading series (I): Courier routing and assignment for food delivery service using reinforcement learning
猜你喜欢

强化学习基础记录
![[paper reproduction] cyclegan (based on pytorch framework) {unfinished}](/img/16/43d8929d1a37c1c68e959d5854e18c.jpg)
[paper reproduction] cyclegan (based on pytorch framework) {unfinished}

Wei Shen of Peking University revealed the current situation: his class is not very good, and there are only 5 or 6 middle-term students left after leaving class

强化学习基础记录

Record a penetration of the cat shed from outside to inside. Library operation extraction flag

sqqyw(淡然点图标系统)漏洞复现和74cms漏洞复现

How to understand the difference between technical thinking and business thinking in Bi?

Strengthen basic learning records

Matlab opens M file garbled solution

Canvas foundation 1 - draw a straight line (easy to understand)
随机推荐
Get started with typescript
附加简化版示例数据库到SqlServer数据库实例中
A complete collection of papers on text recognition
Experiment 8 exception handling
实验九 输入输出流(节选)
7-4 散列表查找(PTA程序设计)
强化学习基础记录
7-9 make house number 3.0 (PTA program design)
AQS details
【Numpy和Pytorch的数据处理】
Ucos-iii learning records (11) - task management
SQL注入
Xray and Burp linked Mining
【MySQL-表结构与完整性约束的修改(ALTER)】
Hackmyvm target series (2) -warrior
【数据库 三大范式】一看就懂
Detailed explanation of network foundation
实验五 类和对象
DVWA (5th week)
XSS unexpected event