| Chapter 6: Owning Metasploit




Download 22,59 Mb.
Pdf ko'rish
bet165/225
Sana14.05.2024
Hajmi22,59 Mb.
#232856
1   ...   161   162   163   164   165   166   167   168   ...   225
Bog'liq
learningkalilinux

180 | Chapter 6: Owning Metasploit


---- --------------- -------- -----------
LogSpider
3
no
0
=
disabled, 
1
=
CSV, 
2
=
table 
(
txt
)
,
3
=
one liner 
(
txt
)
(
Accepted: 0, 1, 2, 3
)
MaxDepth
999
yes Max number of subdirectories to spider
RHOSTS yes The target address range or CIDR
identifier
SMBDomain . no The Windows domain to use 
for
authentication
SMBPass no The password 
for
the specified username
SMBUser no The username to authenticate as
ShowFiles
false
yes Show detailed information when
spidering
SpiderProfiles
true
no Spider only user profiles when
share
=
C
$
SpiderShares
false
no Spider shares recursively
THREADS
1
yes The number of concurrent threads
msf auxiliary
(
scanner/smb/smb_enumshares
)

set 
RHOSTS 192.168.86.48
RHOSTS
=
> 192.168.86.48
msf auxiliary
(
scanner/smb/smb_enumshares
)
> run
[
-
]
192.168.86.48:139 - Login Failed: The SMB server did not reply to our request
[
*
]
192.168.86.48:445 - Windows 
2008
R2 Service Pack 
1
(
Unknown
)
[
*
]
192.168.86.48:445 - No shares collected
[
*
]
Scanned 
1
of 
1
hosts 
(
100% 
complete
)
[
*
]
Auxiliary module execution completed
Based on running this module, it appears credentials are necessary to gather much in
the way of information from our target. This is not unexpected, of course, but it is
worth trying to run the scan nonetheless.

Download 22,59 Mb.
1   ...   161   162   163   164   165   166   167   168   ...   225




Download 22,59 Mb.
Pdf ko'rish