Information gathering and enumeration on various protocols
In this section, we'll explore various auxiliary modules within the Metasploit Framework that can be effectively used for information gathering and enumeration on various protocols, including TCP, UDP, FTP, SMB, SMTP, HTTP, SSH, DNS, and RDP.
Let's learn about each of these protocols and understand the corresponding auxiliary modules, along with the necessary variable configurations.
Transmission Control Protocol
TCP is a connection-oriented protocol that ensures reliable packet transmission. Many services, such as Telnet, SSH, FTP, and SMTP, make use of the TCP protocol. This module performs a simple port scan against the target system and tells us which TCP ports are open.
Its auxiliary module name is auxiliary/scanner/portscan/tcp
, and you will have to configure the following parameters:
RHOSTS
: IP address or IP range of the target to be scannedPORTS
: Range of ports to be scanned