O'Reilly logo

Metasploit Penetration Testing Cookbook by Abhinav Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Working with scanner auxiliary modules

Let us begin our experimentation with scanner modules. We have already learnt about scanning in detail using Nmap. In this recipe, we will analyze some of the ready-made scanning modules which ships with the framework. Even though Nmap is a powerful scanning tool, still there can be situations where we have to perform a specific type of scan, such as scanning for the presence of a MySQL database.

Metasploit provides us with a complete list of such useful scanners. Let us move ahead and practically implement some of them.

Getting ready

To find the list of available scanners, we will have to browse to /pentest/exploits/framework3/modules/auxiliary/scanner.

You can find a collection of more than 35 useful scan ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required