From the course: Metasploit Essential Training
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Using enumeration modules
From the course: Metasploit Essential Training
Using enumeration modules
- [Instructor] One of the final pieces of the puzzle here is really around using these post exploitation modules but actually focusing more on what I'm going to call post enumeration. So we talked about information gathering upfront where we do some type of enumeration to identify targets, et cetera. But what we also have now, once we have exploited an environment or multiple as we have here, then we can actually utilize post exploitation gathering capabilities to retrieve more information. And these are all what's referred to as enumeration modules. Now we kind of looked at some of these before, so we can utilize what's called an auxiliary scanner. So for example, if I just say use auxiliary/scanner/smb, and then just do smb_enumshares like so, this is going to use a SMB scanner. So if I do show options here, it's going to require some specific things. And the first thing you'll see is the RHOSTS and the username and the…