Kali linux 2016.2(Rolling)中metasploit的主机探测
不多说,直接上干货!

1、活跃主机扫描




root@kali:~# ping -c 202.193.58.13
PING 202.193.58.13 (202.193.58.13) () bytes of data.
bytes from 202.193.58.13: icmp_seq= ttl= time=25.4 ms
From 202.193.58.69: icmp_seq= Redirect Network(New nexthop: 202.193.58.13)
bytes from 202.193.58.13: icmp_seq= ttl= time=9.26 ms
From 202.193.58.69: icmp_seq= Redirect Network(New nexthop: 202.193.58.13)
bytes from 202.193.58.13: icmp_seq= ttl= time=6.98 ms
From 202.193.58.69: icmp_seq= Redirect Network(New nexthop: 202.193.58.13)
bytes from 202.193.58.13: icmp_seq= ttl= time=3.47 ms
From 202.193.58.69: icmp_seq= Redirect Network(New nexthop: 202.193.58.13)
bytes from 202.193.58.13: icmp_seq= ttl= time=4.89 ms --- 202.193.58.13 ping statistics ---
packets transmitted, received, % packet loss, time 4010ms
rtt min/avg/max/mdev = 3.476/10.010/25.439/7.959 ms
root@kali:~#
当然,你也用下面这个

2、Metasploit的主机发现模块

arp_sweep模块便是一个ARP扫描器,如下所示。
arp_sweep使用ARP请求美剧本地局域网中的所有活跃主机
udp_sweep通过发送UDP数据包探查制定主机是否活跃,兵发现主机上的UDP服务

root@kali:~# msfconsole
....
msf > use auxiliary/scanner/discovery/arp_sweep
msf auxiliary(arp_sweep) > show options Module options (auxiliary/scanner/discovery/arp_sweep): Name Current Setting Required Description
---- --------------- -------- -----------
INTERFACE no The name of the interface
RHOSTS yes The target address range or CIDR identifier
SHOST no Source IP Address
SMAC no Source MAC Address
THREADS yes The number of concurrent threads
TIMEOUT yes The number of seconds to wait for new data msf auxiliary(arp_sweep) >

设置好RHOSTS和THREADS参数后,输入run命令启动扫描器,如下图所示。

msf auxiliary(arp_sweep) > set RHOSTS 202.193.58.13/
RHOSTS => 202.193.58.13/
msf auxiliary(arp_sweep) > set THREADS
THREADS =>
msf auxiliary(arp_sweep) > run [*] 202.193.58.7 appears to be up (UNKNOWN).
[*] 202.193.58.7 appears to be up (UNKNOWN).
[*] 202.193.58.9 appears to be up (UNKNOWN).
[*] 202.193.58.9 appears to be up (UNKNOWN).
[*] 202.193.58.11 appears to be up (UNKNOWN).
[*] 202.193.58.12 appears to be up (UNKNOWN).
[*] 202.193.58.13 appears to be up (UNKNOWN).
[*] 202.193.58.13 appears to be up (ASUSTek COMPUTER INC.).
[*] 202.193.58.14 appears to be up (UNKNOWN).
[*] 202.193.58.19 appears to be up (UNKNOWN).
[*] 202.193.58.20 appears to be up (ELITEGROUP COMPUTER SYSTEMS CO., LTD.).
[*] 202.193.58.23 appears to be up (UNKNOWN).
[*] 202.193.58.26 appears to be up (COMPAL INFORMATION(KUNSHAN)CO.,LTD).
[*] 202.193.58.33 appears to be up (UNKNOWN).
[*] 202.193.58.47 appears to be up (TP-LINK TECHNOLOGIES CO., LTD.).
[*] 202.193.58.48 appears to be up (UNKNOWN).
[*] 202.193.58.53 appears to be up (UNKNOWN).
[*] 202.193.58.55 appears to be up (UNKNOWN).
[*] 202.193.58.58 appears to be up (UNKNOWN).
[*] 202.193.58.60 appears to be up (D-Link International).
[*] 202.193.58.7 appears to be up (UNKNOWN).
[*] 202.193.58.69 appears to be up (COMPAL INFORMATION (KUNSHAN) CO., LTD).
[*] 202.193.58.73 appears to be up (ELITEGROUP COMPUTER SYSTEMS CO., LTD.).
[*] 202.193.58.76 appears to be up (UNKNOWN).
[*] 202.193.58.82 appears to be up (UNKNOWN).
[*] 202.193.58.83 appears to be up (Armorlink shanghai Co. Ltd).
[*] 202.193.58.85 appears to be up (QUANTA COMPUTER INC.).
[*] 202.193.58.7 appears to be up (UNKNOWN).
[*] 202.193.58.98 appears to be up (Advantech Technology (CHINA) Co., Ltd.).
[*] 202.193.59.254 appears to be up (FUJIAN STAR-NET COMMUNICATION CO.,LTD).
[*] 202.193.58.109 appears to be up (UNKNOWN).
[*] 202.193.58.111 appears to be up (UNKNOWN).
[*] 202.193.58.7 appears to be up (UNKNOWN).
[*] 202.193.58.148 appears to be up (UNKNOWN).
[*] 202.193.58.155 appears to be up (Jetway Information Co., Ltd.).
[*] 202.193.58.13 appears to be up (UNKNOWN).
[*] 202.193.58.162 appears to be up (UNKNOWN).
[*] 202.193.58.165 appears to be up (Tenda Technology Co., Ltd.).
[*] 202.193.58.171 appears to be up (UNKNOWN).
[*] 202.193.58.179 appears to be up (UNKNOWN).
[*] 202.193.58.180 appears to be up (Dell Inc).
[*] 202.193.58.13 appears to be up (UNKNOWN).
[*] 202.193.59.254 appears to be up (FUJIAN STAR-NET COMMUNICATION CO.,LTD).
[*] 202.193.58.197 appears to be up (UNKNOWN).
[*] 202.193.58.208 appears to be up (UNKNOWN).
[*] 202.193.58.215 appears to be up (Universal Global Scientific Industrial Co., Ltd.).
[*] 202.193.58.13 appears to be up (UNKNOWN).
[*] 202.193.58.220 appears to be up (UNKNOWN).
[*] 202.193.58.224 appears to be up (UNKNOWN).
[*] 202.193.58.230 appears to be up (ELITEGROUP COMPUTER SYSTEMS CO., LTD.).
[*] 202.193.58.231 appears to be up (UNKNOWN).
[*] 202.193.58.236 appears to be up (G-PRO COMPUTER).
[*] 202.193.58.242 appears to be up (UNKNOWN).
[*] Scanned of hosts (% complete)
[*] Auxiliary module execution completed
msf auxiliary(arp_sweep) >
当然,大家可以用下面的


Kali linux 2016.2(Rolling)中metasploit的主机探测的更多相关文章
- MetaSploit攻击实例讲解------社会工程学set攻击(kali linux 2016.2(rolling))(详细)
不多说,直接上干货! 首先,如果你是用的BT5,则set的配置文件是在 /pentest/exploits/set/set_config下. APACHE_SERVER=ONSELF_SIGNED_A ...
- MetaSploit攻击实例讲解------Metasploit自动化攻击(包括kali linux 2016.2(rolling) 和 BT5)
不多说,直接上干货! 前期博客 Kali linux 2016.2(Rolling)里Metasploit连接(包括默认和自定义)的PostgreSQL数据库 Kali linux 2016.2(Ro ...
- MetaSploit攻击实例讲解------终端下PostgreSQL数据库的使用(包括kali linux 2016.2(rolling) 和 BT5)
不多说,直接上干货! 配置msf连接postgresql数据库 我这里是使用kali linux 2016.2(rolling) 用过的博友们都知道,已经预安装好了PostgreSQL. 1. p ...
- MetaSploit攻击实例讲解------工具Meterpreter常用功能介绍(kali linux 2016.2(rolling))(详细)
不多说,直接上干货! 说在前面的话 注意啦:Meterpreter的命令非常之多,本篇博客下面给出了所有,大家可以去看看.给出了详细的中文 由于篇幅原因,我只使用如下较常用的命令. 这篇博客,利用下面 ...
- MetaSploit攻击实例讲解------攻击445端口漏洞(kali linux 2016.2(rolling))(详细)
不多说,直接上干货! 大家,相信最近的这个事件,对于445端口已经是非常的小心了.勒索病毒 445端口是一个毁誉参半的端口,有了它我们可以在局域网中轻松访问各种共享文件夹或共享打印机,但也正是因为有了 ...
- Kali linux 2016.2 的 plyload模块之meterpreter plyload详解
不多说,直接上干货! 前期博客 Kali linux 2016.2(Rolling)中的payloads模块详解 当利用成功后尝试运行一个进程,它将在系统进程列表里显示,即使在木马中尝试执行系统命令, ...
- Kali linux 2016.2(Rolling)中的Metasploit如何更新与目录结构初步认识
如何更新MSF 1.Windows平台 方法1: 运行msfupdate.bat 在msfconsole里执行命令svn update 或者 方法2: 2.unix/linux平台 方法1: 运行m ...
- Kali linux 2016.2(Rolling)中的payloads模块详解
不多说,直接上干货! 前期博客 Kali linux 2016.2(Rolling)中的Exploits模块详解 payloads模块,也就是shellcode,就是在漏洞利用成功后所要做的事情.在M ...
- Kali linux 2016.2(Rolling)里Metasploit连接(包括默认和自定义)的PostgreSQL数据库之后的切换到指定的工作空间
不多说,直接上干货! 为什么要这么做? 答: 方便我们将扫描不同的目标或目标的不同段,进行归类.为了更好的后续工作! 前期博客 Kali linux 2016.2(Rolling)里Metasploi ...
随机推荐
- <pre>标签
<pre>标签最主要的认识就是预格式化文本,被包围在 pre 元素中的文本一般会保留空格和换行符.而文本也会呈现为等宽字体.经经常使用于在网页中显示计算机源码. 1.格式化文本举例 &l ...
- HTML5简单进度环插件
前几天做了一个进度条的插件.今天我用HTML5的arc做一个简单的进度环的插件. 代码演示 事实上非常easy的.相同,我们先用一个实例: 配置js代码 var setting = { id: &qu ...
- POJ-3264-Balanced Lineup-单点更新
题目链接:id=3264">http://poj.org/problem? id=3264 这是一个单点更新的模板题,就不详解了,HDU敌兵布阵那题我有详解:链接:http://blo ...
- SQL学习之使用order by 依照指定顺序排序或自己定义顺序排序
我们通常须要依据客户需求对于查询出来的结果给客户提供自己定义的排序方式,那么我们通常sql须要实现方式都有哪些,參考很多其它资料总结例如以下(不完好的和错误望大家指出): 一.假设我们仅仅是对于在某个 ...
- bzoj1019: [SHOI2008]汉诺塔(动态规划)
1019: [SHOI2008]汉诺塔 题目:传送门 简要题意: 和经典的汉诺塔问题区别不大,但是题目规定了一个移动时的优先级: 如果当前要从A柱子移动,但是A到C的优先级比A到B的优先级大的话,那就 ...
- java中return在Try-Catch中的执行顺序
我们知道return会结束此方法并返回指定值.以及在Try-catch-finally中无论try代码块中有没有异常finally中的代码时都会被执行的.但是如果return包含在try-catch- ...
- Codeforces 987B. High School: Become Human
解题思路: 1.题意:判断x^y和y^x谁大谁小. 2.由于x^y和y^x太大了,时间复杂度也不允许,所以做同等变换,比较e^(ylnx)和e^(xlny). 3.即为比较ylnx和xlny的大小. ...
- 《Unix环境高级编程》读书笔记 第5章-标准I/O流
1. 引言 标准I/O库由ISO C标准说明,由各个操作系统实现 标准I/O库处理很多细节,如缓冲区分配.以优化的块长度执行I/O等.这些处理使用户不必担心如何使用正确的块长度,这使得它便于用于使用, ...
- Python内置数据结构之字符串str
1. 数据结构回顾 所有标准序列操作(索引.切片.乘法.成员资格检查.长度.最小值和最大值)都适用于字符串,但是字符串是不可变序列,因此所有的元素赋值和切片赋值都是非法的. >>> ...
- NOIp2018模拟赛三十五
两道大数据结构把我砸懵 成绩:未提交 Orz xfz两道正解 A:[BZOJ4049][CREC2014B]mountainous landscape B:CJB的大作(CF改编题)