This translation is older than the original page and might be outdated. See what has changed.

Host Discovery with Metasploit database

Approved 2024/02/04 23:26 by psycore (version: 2) Newest approved | Approver: psycore

This is an old revision of the document!


Host Discovery with Metasploit database

Prepare database

Create PostgreSQL database and set up a user with access rights for it.

Metasploit: Connect database

msf6 > db_connect user:pass@127.0.0.1/db_name

Check connection

msf6 > db_status
[*] Connected to db_name. Connection type: postgresql. Connection name: local_db_service.

Metasploit: Create workspace

msf6 > workspace
* default
msf6 > workspace -a new_ws
[*] Added workspace: new_ws
[*] Workspace: new_ws
msf6 > workspace
  default
* new_ws

nmap Scan

msf6 > db_nmap -sP 192.168.2.0/24
[*] Nmap: Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-29 21:57 Mitteleurop�ische Zeit
[*] Nmap: Nmap scan report for 192.168.2.1
...

Check hosts

sf6 > hosts
 
Hosts
=====
 
address        mac                name                    os_name  os_flavor  os_sp  purpose  info  comments
-------        ---                ----                    -------  ---------  -----  -------  ----  --------
192.168.2.1    XX:XX:XX:XX:XX:XX
192.168.2.43   XX:XX:XX:XX:XX:XX  192-168-2-43.fritz.box

Prepare and perform port scan

Pass hosts as parameters

msf6 > use auxiliary/scanner/portscan/tcp
msf6 auxiliary(scanner/portscan/tcp) > hosts -R

Start port scan

msf6 auxiliary(scanner/portscan/tcp) > run
 
[+] 192.168.2.1:          - 192.168.2.1:21 - TCP OPEN
[+] 192.168.2.1:          - 192.168.2.1:53 - TCP OPEN
[+] 192.168.2.1:          - 192.168.2.1:80 - TCP OPEN
[+] 192.168.2.1:          - 192.168.2.1:443 - TCP OPEN
en/it-security/host_discovery_msf_db.1707085585.txt.gz · Last modified: 2024/02/04 23:26
CC Attribution-Noncommercial-Share Alike 4.0 International