From the course: Metasploit Essential Training
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
How to use scanners
From the course: Metasploit Essential Training
How to use scanners
- [Instructor] Now, one of the most important pieces of working with Metasploit and specific targets that we want to kind of try and connect to or inspect is the ability for us to use scanning capabilities that reside within Metasploit. Now, first off, let's kind of look at search scanner, search scanner will give us a breakdown of all of the scanners that are available within Metasploit, and these can be everything from Windows ones all the way through to SQL to specific types of technologies or capabilities that exist. So that means we're able to use at any point a scanner. Now, let's say we wanted to use a specific type of scanner, so maybe a portscan, I can do search portscan, and then you'll see here we have a TCP a SYN one, FTP, et cetera, so we have different types of scanners that are available. You'll notice one of the most important things here is that these reside within what's called the auxiliary folder. Now…