上QQ阅读APP看书,第一时间看更新
Using Metasploit modules
Metasploit modules are very easy to use. In a nutshell, anyone can follow this process to get familiar with the modules:
Let's use the smb_version auxiliary module in this case:
- By executing the use auxiliary/scanner/smb/smb_version command, we have loaded the module in the console:
- Now, we need to configure the module according to our needs. The available options for smb_version can be seen by using the show options command:
- We can use the set/setg command to configure the module options. Advanced options for smb_version are also available and can be shown by using the show advanced command:
- To evade IDS/IPS endpoints, you can set the evasion options for the smb_version module. Use the show evasion command to list all the supported evasion options for this module:
- Now that the configuration is done, you can just check for the missing options one last time before running the module by executing the show missing command:
- In this case, we'll set up RHOSTS in 192.168.2.17 and then execute the module either by using the run command or the execute command:
Note: The modules won't run unless all the required settings have been configured.