Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

A brief introduction to Metasploit and what the host scan looks like

2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/01 Report--

This article gives you an introduction to Metasploit and how the host scan is. The content is very detailed. Interested friends can use it for reference. I hope it will be helpful to you.

The Metasploit Framework (MSF) is an open source tool that facilitates penetration testing.

Environment: kali2019.04

Open the terminal and enter msfconsole

1. Exploits: vulnerability exploitation module

Through the scanning and loophole proof of the target, the loophole or configuration problem of the target is detected, and then the exploit module is used to attack the target machine.

2. Auxiliary: auxiliary module

Store a variety of auxiliary tools, including scanning, sniffing, fingerprint identification and so on.

3. Post: late infiltration module

Penetrate deeper into the goals that have gained control.

4. Payloads: attack payload module

This is the code that we want the target to execute after attacking the target.

5. Encoders: coding tool module

Prevent it from being handled by antivirus software

6. Nops: null instruction module

Null or irrelevant instructions that do not affect the running of the program, used to populate.

7. Evasion: generate Trojan horse

Generate Trojans available for all kinds of systems

Third, host scanning

1. Search portscan searches for available port modules

3. Set RHOSTS 192.168.1.130 sets the host to be scanned as 192.168.1.130

Set PORTS 1-1000 sets the port to be scanned as 1-1000

Set THREADS 20 sets the number of threads to 20

Fourth, scan with namp

Enter nmap-O-Pn 192.168.1.130 directly

About the introduction of Metasploit and host scanning is how to share here, I hope that the above content can be of some help to you, can learn more knowledge. If you think the article is good, you can share it for more people to see.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report