Working with scanner auxiliary modules
Let us begin our experimentation with scanner modules. We have already learnt about scanning in detail using Nmap. In this recipe, we will analyze some of the ready-made scanning modules which ships with the framework. Even though Nmap is a powerful scanning tool, still there can be situations where we have to perform a specific type of scan, such as scanning for the presence of a MySQL database.
Metasploit provides us with a complete list of such useful scanners. Let us move ahead and practically implement some of them.
Getting ready
To find the list of available scanners, we will have to browse to /pentest/exploits/framework3/modules/auxiliary/scanner
.
You can find a collection of more than 35 useful scan ...
Get Metasploit Penetration Testing Cookbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.