Vulnerability scanning with MSF auxiliary modules
Similar to the vulnerability scanning scripts available in NSE, Metasploit also offers a number of useful vulnerability scanners. Like Nmap's scripts, most of these are fairly targeted and are used to scan a particular service.
Getting ready
To perform vulnerability analysis with Metasploit auxiliary modules, you will need to have a system that is running network services over TCP or UDP. In the example provided, a Windows XP system with an RDP service is used to for this task. For more information on setting up a Windows system, refer to the Installing Windows Server recipe in Chapter 1, Getting Started, of this book.
How to do it…
There are a number of different ways that one can identify the vulnerability scanning auxiliary modules in Metasploit. One effective way is to browse to the auxiliary scanner directory, as this is the location where most vulnerability identification scripts will be found. Have a look at the following example:
root...