From the course: Metasploit Essential Training

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Understanding scanners within Metasploit

Understanding scanners within Metasploit

From the course: Metasploit Essential Training

Understanding scanners within Metasploit

- [Instructor] Metasploit contains many auxiliary modules of which some are scanners. Auxiliary modules are essentially used to cover the first stage of a penetration test, so fingerprinting and vulnerability scanning. There are different types of scanners available depending on what is being scanned. Some of the scanners are inbuilt into Metasploit, others are integrated to other applications. There are a variety of port scanners available to us within Metasploit framework allowing us to properly enumerate the target systems. The most common scanning performed as part of the discovery phase includes ping which is determining if the target is online, a port scan which is looking for ports, and then identifying the operating system and any running services. As an example, each scanner requires properties in order to execute. One of the most common properties is the RHOSTS, which is either the target IP range or a specific…

Contents