Hands-On Web Penetration Testing with Metasploit
上QQ阅读APP看书,第一时间看更新

Auxiliary module

In this case, we have a target host with an IP of 192.168.2.17. You can see the services running on this host in the following screenshot:

From a network penetration testing perspective, an attacker would definitely look into port 445/tcp (SMB) for exploitation, so let's use a module for SMB:

  1. Click the Modules tab in the Project tab bar to display the Modules page:

  1. For SMB, you can use the SMB Version Detection auxiliary module, which can be searched for using the search bar:

  1. Once you've selected the module, the module options page will be displayed. You can set the target address, along with some other options (if required):

  1. Clicking on Run Module (shown in the preceding screenshot) will execute the module and the output for the module will be displayed:

  1. You can confirm the result that was found by the module by going to the Project tab bar -> Analysis -> Notes:

After enumerating the target, you can use an exploit module.