it-security:host_discovery_msf_db

Host Discovery mit Metasploit Datenbank

PostgreSQL Datenbank anlegen und einen Benutzer mit Zugriffsrechten für diese einrichten.

msf6 > db_connect user:pass@127.0.0.1/db_name
msf6 > db_status
[*] Connected to db_name. Connection type: postgresql. Connection name: local_db_service.
msf6 > workspace
* default
msf6 > workspace -a new_ws
[*] Added workspace: new_ws
[*] Workspace: new_ws
msf6 > workspace
  default
* new_ws
msf6 > db_nmap -sP 192.168.2.0/24
[*] Nmap: Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-29 21:57 Mitteleurop�ische Zeit
[*] Nmap: Nmap scan report for 192.168.2.1
...
sf6 > hosts
 
Hosts
=====
 
address        mac                name                    os_name  os_flavor  os_sp  purpose  info  comments
-------        ---                ----                    -------  ---------  -----  -------  ----  --------
192.168.2.1    XX:XX:XX:XX:XX:XX
192.168.2.43   XX:XX:XX:XX:XX:XX  192-168-2-43.fritz.box
msf6 > use auxiliary/scanner/portscan/tcp
msf6 auxiliary(scanner/portscan/tcp) > hosts -R
msf6 auxiliary(scanner/portscan/tcp) > run
 
[+] 192.168.2.1:          - 192.168.2.1:21 - TCP OPEN
[+] 192.168.2.1:          - 192.168.2.1:53 - TCP OPEN
[+] 192.168.2.1:          - 192.168.2.1:80 - TCP OPEN
[+] 192.168.2.1:          - 192.168.2.1:443 - TCP OPEN
  • it-security/host_discovery_msf_db.txt
  • Zuletzt geändert: 2024/01/12 22:15
  • von 127.0.0.1