Hands-On Web Penetration Testing with Metasploit
上QQ阅读APP看书,第一时间看更新

Using Metasploit modules

Metasploit modules are very easy to use. In a nutshell, anyone can follow this process to get familiar with the modules:

Let's use the smb_version auxiliary module in this case:

  1. By executing the use auxiliary/scanner/smb/smb_version command, we have loaded the module in the console:

  1. Now, we need to configure the module according to our needs. The available options for smb_version can be seen by using the show options command:

  1. We can use the set/setg command to configure the module options. Advanced options for smb_version are also available and can be shown by using the show advanced command:

  1. To evade IDS/IPS endpoints, you can set the evasion options for the smb_version module. Use the show evasion command to list all the supported evasion options for this module:

  1. Now that the configuration is done, you can just check for the missing options one last time before running the module by executing the show missing command:

  1. In this case, we'll set up RHOSTS in 192.168.2.17 and then execute the module either by using the run command or the execute command:


Note: The modules won't run unless all the required settings have been configured.