標籤:des blog http 使用 os io
Metasploit中不僅能夠使用第三方掃描器Nmap等,在其輔助模組中也包含了幾款內建的連接埠掃描器。
查看Metasploit架構提供的連接埠掃描工具:
msf > search portscanMatching Modules================ Name Disclosure Date Rank Description ---- --------------- ---- ----------- auxiliary/scanner/http/wordpress_pingback_access normal Wordpress Pingback Locator auxiliary/scanner/natpmp/natpmp_portscan normal NAT-PMP External Port Scanner auxiliary/scanner/portscan/ack normal TCP ACK Firewall Scanner auxiliary/scanner/portscan/ftpbounce normal FTP Bounce Port Scanner auxiliary/scanner/portscan/syn normal TCP SYN Port Scanner auxiliary/scanner/portscan/tcp normal TCP Port Scanner auxiliary/scanner/portscan/xmas normal TCP "XMas" Port Scanner
使用Metasploit的SYN連接埠掃描器對單個主機進行一次簡單的掃描:
msf > use scanner/portscan/syn
設定RHOST參數為192.168.119.132,線程數為50
RHOSTS => 192.168.119.132msf auxiliary(syn) > set THREADS 50THREADS => 50msf auxiliary(syn) > run[*] TCP OPEN 192.168.119.132:80[*] TCP OPEN 192.168.119.132:135[*] TCP OPEN 192.168.119.132:139[*] TCP OPEN 192.168.119.132:1433[*] TCP OPEN 192.168.119.132:2383[*] TCP OPEN 192.168.119.132:3306[*] TCP OPEN 192.168.119.132:3389[*] Scanned 1 of 1 hosts (100% complete)[*] Auxiliary module execution completed