Information gathering and enumeration
In this section, we'll explore various auxiliary modules within the Metasploit Framework that can be effectively used for information gathering and enumeration of various protocols such as TCP, UDP, FTP, SMB, SMTP, HTTP, SSH, DNS, and RDP. For each of these protocols, you will learn multiple auxiliary modules along with the necessary variable configurations.
Transmission Control Protocol
Transmission Control Protocol (TCP) is a connection-oriented protocol and ensures reliable packet transmission. Many of the services such as Telnet, SSH, FTP, and SMTP make use of the TCP protocol. This module performs a simple port scan against the target system and tells us which TCP ports are open.
Its auxiliary module name is auxiliary/scanner/portscan/tcp
, and you will have to configure the following parameters:
- RHOSTS: IP address or IP range of the target to be scanned
- PORTS: Range of ports to be scanned
We can see this auxiliary module in the following screenshot: