Working with scanner auxiliary modules
Let us begin our experimentation with scanner modules. We have already learnt about scanning in detail using Nmap. In this recipe, we will analyze some of the ready-made scanning modules which ships with the framework. Even though Nmap is a powerful scanning tool, still there can be situations where we have to perform a specific type of scan, such as scanning for the presence of a MySQL database.
Metasploit provides us with a complete list of such useful scanners. Let us move ahead and practically implement some of them.
Getting ready
To find the list of available scanners, we will have to browse to /pentest/exploits/framework3/modules/auxiliary/scanner
.
You can find a collection of more than 35 useful scan modules which can be used under various penetration testing scenarios.
How to do it...
Let us start with a basic HTTP scanner. You will see that there are many different HTTP scan options available. We will discuss few of them here.
Consider the dir_scanner...