metasploit port 详细使用方法
生活随笔
收集整理的這篇文章主要介紹了
metasploit port 详细使用方法
小編覺得挺不錯的,現在分享給大家,幫大家做個參考.
信息收集:
| auxiliary/sniffer/psnuffle 嗅探抓包auxiliary/scanner/http/dir_scanner 掃描網站目錄auxiliary/gather/search_email_collector 搜索網站中的E-mail |
服務掃描及利用模塊:
| auxiliary/scanner/portscan/syn SYN端口掃描auxiliary/scanner/portscan/tcp TCP端口掃描auxiliary/scanner/portscan/xmas TCP"XMas"端口掃描auxiliary/scanner/portscan/syn 端口探測auxiliary/scanner/portscan/ack ACK防火墻掃描auxiliary/scanner/discovery/arp_sweep 探測網段中存活主機 |
21端口:FTP
| auxiliary/scanner/ftp/ftp_version FTP主機掃描auxiliary/scanner/ftp/anonymos FTP匿名登錄 |
22端口:SSH
| auxiliary/scanner/ssh/ssh_version SSH服務掃描auxiliary/scanner/ssh/ssh_login SSH口令猜測 |
23端口:Telnet
| auxiliary/scanner/telnet/telnet_version Telnet服務掃描auxiliary/scanner/telnet/telnet_version Telnet口令猜測 |
25端口:SMTP
| auxiliary/scanner/smtp/smtp_version SMTP版本掃描auxiliary/scanner/smtp/smtp_enum SMTP枚舉 |
69端口:TFTP
| auxiliary/scanner/tftp/tftpbrute FTP文件掃描auxiliary/scanner/ftp/anonymous FTP匿名登錄 |
139、445端口:SMB
| auxiliary/scanner/smb/smb_version 掃描操作系統版本auxiliary/scanner/smb/smb_lookupsid 掃描組的用戶windows/smb/psexec 用于登錄auxiliary/scanner/smb/smb_login 用于登錄auxiliary/scanner/smb/smb_enumusers 枚舉系統上的用戶 |
161端口:SNMP
| auxiliary/scanner/snmp/snmp_enum 批量檢測SNMPauxiliary/scanner/snmp/snmp_login 掃描SNMP主機 |
1521端口:oracle
| auxiliary/scanner/oracle/tnslsnr_version oracle服務掃描 |
1433端口:mssql
| auxiliary/scanner/mssql/mssql_ping 掃描開放mssql主機 |
3306端口:mysql
| auxiliary/scanner/mysql/mysql_login mysql口令猜測 |
5432端口:postgres
| auxiliary/scanner/postgres/postgres_login postgres口令猜測 |
8080端口:tomcat
| auxiliary/scanner/http/tomcat_mgr_login tomcat口令猜測 |
漏洞利用:
總結
以上是生活随笔為你收集整理的metasploit port 详细使用方法的全部內容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: rabbitmq direct repl
- 下一篇: git push 报错 Empty re