• metasploit


    msf > use scanner/portscan/syn
    msf  auxiliary(syn) > set RHOSTS 192.168.0.101
    RHOSTS => 192.168.0.101
    msf  auxiliary(syn) > set THREADS 50
    THREADS => 50
    msf  auxiliary(syn) > run
    [-] Auxiliary failed: RuntimeError eth0: no IPv4 address assigned
    [-] Call stack:
    [-]   /opt/metasploit-4.4.0/msf3/lib/msf/core/exploit/capture.rb:113:in `setfilter'
    [-]   /opt/metasploit-4.4.0/msf3/lib/msf/core/exploit/capture.rb:113:in `open_pcap'
    [-]   /opt/metasploit-4.4.0/msf3/modules/auxiliary/scanner/portscan/syn.rb:51:in `run_batch'
    [-]   /opt/metasploit-4.4.0/msf3/lib/msf/core/auxiliary/scanner.rb:164:in `block in run'
    [-]   /opt/metasploit-4.4.0/msf3/lib/msf/core/thread_manager.rb:100:in `call'
    [-]   /opt/metasploit-4.4.0/msf3/lib/msf/core/thread_manager.rb:100:in `block in spawn'
    [*] Auxiliary module execution completed

    refer to document: http://seclists.org/metasploit/2010/q3/359

    msf  auxiliary(syn) > show options
    
    Module options (auxiliary/scanner/portscan/syn):
    
       Name       Current Setting  Required  Description
       ----       ---------------  --------  -----------
       BATCHSIZE  256              yes       The number of hosts to scan per set
       INTERFACE                   no        The name of the interface
       PORTS      1-10000          yes       Ports to scan (e.g. 22-25,80,110-900)
       RHOSTS     192.168.0.101    yes       The target address range or CIDR identifier
       SNAPLEN    65535            yes       The number of bytes to capture
       THREADS    50               yes       The number of concurrent threads
       TIMEOUT    500              yes       The reply read timeout in milliseconds
    
    msf  auxiliary(syn) > set INTERFACE wlan0
    INTERFACE => wlan0
    msf  auxiliary(syn) > run
    
    [*]  TCP OPEN 192.168.0.101:135
    [*]  TCP OPEN 192.168.0.101:139
    [*]  TCP OPEN 192.168.0.101:445
    [*]  TCP OPEN 192.168.0.101:1025
    [*]  TCP OPEN 192.168.0.101:1026
    [*]  TCP OPEN 192.168.0.101:1029
    [*]  TCP OPEN 192.168.0.101:1030
    [*]  TCP OPEN 192.168.0.101:1032
    [*]  TCP OPEN 192.168.0.101:1035
    [*]  TCP OPEN 192.168.0.101:1036
    [*]  TCP OPEN 192.168.0.101:3306
    [*]  TCP OPEN 192.168.0.101:5357
    [*] Scanned 1 of 1 hosts (100% complete)
    [*] Auxiliary module execution completed
  • 相关阅读:
    springmvc学习笔记---idea创建springmvc项目
    Spring Boot中使用Swagger2构建RESTful API文档
    Dubbo原理实现之使用Javassist字节码结束构建代理对象
    Dubbo启动时服务检查
    Dubbo原理实现之代理接口的定义
    dubbo实现原理之动态编译
    Dubbo实现原理之基于SPI思想实现Dubbo内核
    dubbo实现原理之SPI简介
    Spring中使用StandardServletMultipartResolver进行文件上传
    SpringCloud之Feign
  • 原文地址:https://www.cnblogs.com/vigarbuaa/p/2713126.html
Copyright © 2020-2023  润新知