{{tag>english linux kali it-security pentest}}
====== Host Discovery with Metasploit database ======
===== Prepare database =====
Create PostgreSQL database and set up a user with access rights for it.
root@kali:~# msfdb init
Creating database user 'msf'
Enter password for new role:
Enter it again:
Creating databases 'msf' and 'msf_test'
Creating configuration file in /usr/share/metasploit-framework/config/database.yml
Creating initial database schema
===== Metasploit: Connect database =====
msf6 > db_connect user:pass@127.0.0.1/db_name
==== Check connection ====
msf6 > db_status
[*] Connected to db_name. Connection type: postgresql. Connection name: local_db_service.
===== Metasploit: Create workspace =====
msf6 > workspace
* default
msf6 > workspace -a new_ws
[*] Added workspace: new_ws
[*] Workspace: new_ws
msf6 > workspace
default
* new_ws
==== nmap Scan ====
msf6 > db_nmap -sP 192.168.2.0/24
[*] Nmap: Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-29 21:57 Mitteleurop�ische Zeit
[*] Nmap: Nmap scan report for 192.168.2.1
...
===== Check hosts =====
sf6 > hosts
Hosts
=====
address mac name os_name os_flavor os_sp purpose info comments
------- --- ---- ------- --------- ----- ------- ---- --------
192.168.2.1 XX:XX:XX:XX:XX:XX
192.168.2.43 XX:XX:XX:XX:XX:XX 192-168-2-43.fritz.box
===== Prepare and perform port scan =====
==== Pass hosts as parameters ====
msf6 > use auxiliary/scanner/portscan/tcp
msf6 auxiliary(scanner/portscan/tcp) > hosts -R
==== Start port scan ====
msf6 auxiliary(scanner/portscan/tcp) > run
[+] 192.168.2.1: - 192.168.2.1:21 - TCP OPEN
[+] 192.168.2.1: - 192.168.2.1:53 - TCP OPEN
[+] 192.168.2.1: - 192.168.2.1:80 - TCP OPEN
[+] 192.168.2.1: - 192.168.2.1:443 - TCP OPEN