Using Metasploit WMAP

简介: Open the Metasploit Framework Console (msfconsole):$ msfconsole o ...

Open the Metasploit Framework Console (msfconsole):

$ msfconsole
                 o                       8         o   o
                 8                       8             8
ooYoYo. .oPYo.  o8P .oPYo. .oPYo. .oPYo. 8 .oPYo. o8  o8P
8' 8  8 8oooo8   8  .oooo8 Yb..   8    8 8 8    8  8   8
8  8  8 8.       8  8    8   'Yb. 8    8 8 8    8  8   8
8  8  8 `Yooo'   8  `YooP8 `YooP' 8YooP' 8 `YooP'  8   8
..:..:..:.....:::..::.....::.....:8.....:..:.....::..::..:
::::::::::::::::::::::::::::::::::8:::::::::::::::::::::::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

       =[ metasploit v3.3.3-dev [core:3.3 api:1.0]
+ -- --=[ 469 exploits - 219 auxiliary
+ -- --=[ 192 payloads - 22 encoders - 8 nops
       =[ svn r7844 updated today (2009.12.13)

Create a database

msf> db_create wmap_test
[*] Creating a new database instance...
[*] Successfully connected to the database
[*] File: wmap_test

Load the WMAP plugin

msf > load db_wmap 
[*] =[ WMAP v0.6 - et [  ] metasploit.com
[*] Successfully loaded plugin: db_wmap

Add and select a target

msf > wmap_targets -a http://www.example.com/
[*] Added target www.example.com 80 0
[*] Added request www.example.com

msf > wmap_targets  -p
[*]    Id. Host                                 Port    SSL
[*]    1. www.example.com                       80      

msf > wmap_targets  -s 1

msf > wmap_targets  -p
[*]    Id. Host                                 Port    SSL
[*] => 1. www.example.com                       80      

Running WMAP modules

Now that a target has been selected, we can obtain a list of what WMAP modules are available using the wmap_run -t command:

msf > wmap_run -t
[*] Loaded auxiliary/admin/http/tomcat_administration ...
[*] Loaded auxiliary/admin/http/tomcat_manager ...
[*] Loaded auxiliary/scanner/http/frontpage_login ...
[*] Loaded auxiliary/scanner/http/options ...
[*] Loaded auxiliary/scanner/http/version ...
[*] Loaded auxiliary/scanner/http/wmap_cert ...
[*] Loaded auxiliary/scanner/http/wmap_robots_txt ...
[*] Loaded auxiliary/scanner/http/wmap_soap_xml ...
[*] Loaded auxiliary/scanner/http/wmap_ssl ...
[*] Loaded auxiliary/scanner/http/wmap_svn_scanner ...
[*] Loaded auxiliary/scanner/http/wmap_verb_auth_bypass ...
[*] Loaded auxiliary/scanner/http/wmap_vhost_scanner ...
[*] Loaded auxiliary/scanner/http/wmap_webdav_internal_ip ...
[*] Loaded auxiliary/scanner/http/wmap_webdav_scanner ...
[*] Loaded auxiliary/scanner/http/wmap_webdav_website_content ...
[*] Loaded auxiliary/scanner/http/ms09_020_webdav_unicode_bypass ...
[*] Loaded auxiliary/scanner/http/wmap_backup_file ...
[*] Loaded auxiliary/scanner/http/wmap_brute_dirs ...
[*] Loaded auxiliary/scanner/http/wmap_copy_of_file ...
[*] Loaded auxiliary/scanner/http/wmap_dir_listing ...
[*] Loaded auxiliary/scanner/http/wmap_dir_scanner ...
[*] Loaded auxiliary/scanner/http/wmap_dir_webdav_unicode_bypass ...
[*] Loaded auxiliary/scanner/http/wmap_file_same_name_dir ...
[*] Loaded auxiliary/scanner/http/wmap_files_dir ...
[*] Loaded auxiliary/scanner/http/wmap_prev_dir_same_name_file ...
[*] Loaded auxiliary/scanner/http/wmap_replace_ext ...
[*] Loaded auxiliary/scanner/http/writable ...
[*] Loaded auxiliary/scanner/http/wmap_blind_sql_query ...
[*] Loaded auxiliary/scanner/http/wmap_error_sql_injection ...

To actually run the modules, we execute wmap_run with the -e parameter:

msf > wmap_run -e

Reporting

Currently, the results of the WMAP scan are stored in the database. The database can be used to build custom reporting tools, or queried directly from the console:

msf > db_notes
msf > db_vulns

Configuration

If a test module requires a specific parameter to be set or you want to modify the value of a predefined variable, this can be done with the 'setg' command. Example:

msf > setg VHOST www.targetco.com
msf > setg DOMAIN targetco.com
msf > setg EXT .asp
msf > setg WMAP_EXCLUDE_FILE <regex_to_exclude_testing_files>

If you would like to limit the WMAP test to a specific set of modules, you can use a profile file. Profiles can be specified via additional arguments to the wmap_run command.

msf > wmap_run -e path/to/profile/file

The profile file contains the list of modules to execute. See data/wmap/wmap_sample.profile for a sample.

 

URL:http://www.metasploit.com/redmine/projects/framework/wiki/WMAP

 

 

目录
相关文章
|
缓存 前端开发 定位技术
Cesium加载Mapbox自定义地图
Cesium加载Mapbox自定义地图
438 0
|
监控 搜索推荐 数据挖掘
淘宝关键词设置:技巧与实战指南
淘宝关键词设置:技巧与实战指南
1612 1
|
Linux 测试技术 开发工具
Linux文件操作之文本文件编辑与查找
在Linux系统中,文本文件编辑和查找是日常工作中经常遇到的任务。本文将详细介绍Linux下常用的文本文件编辑器和查找命令,包括vi/vim、nano等编辑器,以及grep、sed、awk等查找命令。我们将详细讲解每个工具的使用方法和常见用例,帮助读者高效处理文本文件。
903 0
|
传感器 存储 自动驾驶
ARGO数据集—自动驾驶场景(版本:Argoverse 1.1)
ARGO是一个自动驾驶场景的数据集,它有竞赛排行(立体深度估计、运动预测、3D检测、3D跟踪等等).Argoverse1.1 通过1000 多个驾驶小时中提取,包括 113 个场景的 3D 跟踪注释,和用于运动预测的 324,557 条车辆轨迹。
649 0
|
网络协议 关系型数据库 MySQL
MySQL8.0社区版安装教程
MySQL8.0社区版安装教程
628 0
|
编解码 弹性计算 网络协议
【Netty】Netty高性能原理剖析
我们在实际项目中必然会遇到网络间的通信,也就是RPC,大家肯定都用过Dubbo,那么你对Dubbo底层---Netty了解多少呢?对于它为什么性能如此之高又了解多少呢?这篇文章就简单的介绍下Netty高性能原理。
376 0
【Netty】Netty高性能原理剖析
|
XML 数据格式
htmlparser2.js:一个快速宽松的HTML/XML解析器
htmlparser2.js:一个快速宽松的HTML/XML解析器
428 0
|
Android开发
Android 音乐APP(三)播放音乐、自定义进度条、自动下一曲
Android 音乐APP(三)播放音乐、自定义进度条、自动下一曲
682 0
Android 音乐APP(三)播放音乐、自定义进度条、自动下一曲
|
机器学习/深度学习 人工智能 固态存储
又一家!天数智芯天垓100 产品卡与龙蜥操作系统完成产品兼容互认证
天数智芯天垓100 产品卡与龙蜥操作系统(Anolis OS)8 完成并通过相互兼容性测试认证,双方进行严格测试后,结果显示:相互兼容,功能正常,运行稳定。
又一家!天数智芯天垓100 产品卡与龙蜥操作系统完成产品兼容互认证
Google Earth Engine(GEE)——下载影像有很多分影像,没有用mosaic或者qualityMosaic()函数导致的影像没有镶嵌在一起
Google Earth Engine(GEE)——下载影像有很多分影像,没有用mosaic或者qualityMosaic()函数导致的影像没有镶嵌在一起
617 0
Google Earth Engine(GEE)——下载影像有很多分影像,没有用mosaic或者qualityMosaic()函数导致的影像没有镶嵌在一起