O'Reilly logo

Metasploit Penetration Testing Cookbook - Second Edition by Abhinav Singh, Monika Agarwal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Working with scanner auxiliary modules

Let us begin our experimentation with scanner modules. We have already learned about scanning in detail using Nmap. In this recipe, we will analyze some of the ready-made scanning modules which ships with the framework. Even though Nmap is a powerful scanning tool, there can be situations where we have to perform a specific type of scan, such as scanning for the presence of a MySQL database.

Metasploit provides us with a complete list of such useful scanners. Let us move ahead and practically implement some of them.

Getting ready

To find the list of available scanners, we will have to navigate to /pentest/exploits/framework3/modules/auxiliary/scanner.

You can find a collection of more than 35 useful scan modules ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required