kali linux之msf信息收集

nmap扫描

 

 

Auxiliary 扫描模块

目前有557个扫描方式

 

 

 use auxiliary/scanner/smb/smb_version(smb版本扫描)

 use auxiliary/scanner/smb/pipe_auditor(扫描命名管道,判断smb服务类型,帐号,密码)

 use auxiliary/scanner/smb/pipe_dcerpc_auditor(扫描通过smb管道可以访问的RCERPC服务)

 use auxiliary/scanner/smb/smb_enumshares(smb共享枚举---帐号,密码)

 use auxiliary/scanner/smb/smb_enumusers(smb用户枚举----帐号密码)

 use auxiliary/scanner/smb/smb_lookupsid(sid枚举--帐号,密码)

 use auxiliary/scanner/ssh/ssh_version(ssh版本扫描)

 use auxiliary/scanner/ssh/ssh_login (ssh密码爆破)

 use auxiliary/scanner/ssh/ssh_login_pubkey(ssh公钥登录---set KEY_FILE id_rsa  set USERNAME root)

 use post/windows/gather/enum_patches(基于已经获取了session进行检测windows缺少的补丁)

 use auxiliary/scanner/mssql/mssql_ping(mssql端口扫描)

 use auxiliary/scanner/mssql/mssql_login(爆破mssql密码)

 use auxiliary/admin/mssql/mssql_exec(远程执行代码--set CMD net user user pass /ADD)

 use auxiliary/scanner/ftp/ftp_version(FTP版本扫描)

 use auxiliary/scanner/ftp/anonymous(FTP匿名登录)

 use auxiliary/scanner/ftp/ftp_login(FTP暴力破解)

 use auxiliary/scanner/vnc/vnc_login(vnc密码破解)

 use auxiliary/scanner/vnc/vnc_none_auth(vnc无密码访问---supported:None, free access!)

 use auxiliary/scanner/rdp/ms12_020_check(RDP远程桌面漏洞---检查会不会造成DoS攻击)

 use auxiliary/scanner/ssh/juniper_backdoor(设备后门)

 use auxiliary/scanner/ssh/fortinet_backdoor(设备后门)

 use auxiliary/scanner/vmware/vmauthd_login(VMWare ESXi密码破解)

 use auxiliary/scanner/vmware/vmware_enum_vms(VMWare ESXi密码破解)

 use auxiliary/admin/vmware/poweron_vm(利用web api远程开启虚拟机)

 

HTTP 弱点扫描

 use auxiliary/scanner/http/cert(过期证书扫描)
 use auxiliary/scanner/http/dir_listing(显示目录及文件)
 use auxiliary/scanner/http/files_dir显示目录及文件)
 use auxiliary/scanner/http/dir_webdav_unicode_bypass(WebDAV Unicode 编码身份验证绕过)
 use auxiliary/scanner/http/tomcat_mgr_login(Tomcat 管理登录页面)
 use auxiliary/scanner/http/verb_auth_bypass(基于HTTP方法的身份验证绕过)
 use auxiliary/scanner/http/wordpress_login_enum(Wordpress 密码爆破--- set URI /wordpress/wp-login.php)

WEB应用扫描器

wmap

 load wmap

 wmap_sites -a http://x.x.x.x

 wmap_targets -t http://x.x.x.x/xxx/xx.php

 wmap_run -t

 wmap_run -e

 wmap_vulns -l

 vulns

 

Openvas

 load openvas(需要配置,使用繁琐,导入nbe格式扫描日志,db_import xxx.nbe)

 

Nessus

 load nessus

 nessus_help

 nessus_connect nessus@nessus 192.168.1.12(连接nessus服务器)

 nessus_policy_list

 nessus_scan_new

 nessus_report_list

 

 

 

 

arp扫描 set INTERFACE  RHOSTS  THREADS

 

扫描结果

 

 

syn扫描

set RHOSTS  PORTS THREADS

 

IPID IdIe扫描

查找ipidseq主机

 

 udp扫描

 

密码嗅探

msf5 > use auxiliary/sniffer/psnuffle

支持从pcap抓包文件中提取密码

功能类似于dsniff

目前只支持pop3,imap,ftp,http get协议

set 接口

 

 

 snmp扫描

auxiliary/scanner/snmp/snmp_login

 

 

auxiliary/scanner/snmp/snmp_enum

 

 

auxiliary/scanner/snmp/snmp_enumusers(windows)

 

 

auxiliary/scanner/snmp/snmp_enumshares(windows)

 

 

 

 

 友情链接 http://www.cnblogs.com/klionsec

                http://www.cnblogs.com/l0cm

                http://www.cnblogs.com/Anonyaptxxx

                http://www.feiyusafe.cn

 

posted @ 2019-03-07 22:21  Hydraxx  阅读(859)  评论(0编辑  收藏  举报