Info BackTrack

Linux & Security Tutorial

OS Footprinting Menggunakan Modul Metaspolit Smb Version & Tcp


Sebenarnya saya pribadi lebih suka dengan nmap -v -A untuk mengidentifikasi / Footprinting Ip , tapi dikarenakan saya iseng, ya saya buatin aja artikel sangat sederhana ini. =))

Langsung aja ya. =))

— Start MSF smb_version mode.

msf> use auxiliary/scanner/smb/smb_version
msf auxiliary(smb version)>set rhosts 192.168.1.11 [TARGET HOST RANGE]
msf auxiliary(smb version)>exploit

— Start MSF Tcp mode.

msf> use auxiliary/scanner/portscan/tcp
msf auxiliary(smb version)>set rhosts 192.168.1.11 [TARGET HOST RANGE]
msf auxiliary(smb version)>exploit

–done

Terimakasih telah membaca artikel saya.

Create by Lindo.

Artikel Terkait:

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: