Hello friends in this post we'll see how to finger print OS of the remote system using Metasploit.
If you don't know what is Metasploit and its basics you can read it on my friends blog : Click Here
I consider that you know the basics of metasploit [You must know how to load a module]. So lets get started with fingerprinting using metasploit.
Note that not all computers would be running the smb service.
Our first command would be :
msf > use auxiliary/scanner/smb/smb_version
(Use the appropriate auxiliary module to scan smb. In case you don't know what is smb you can read here
read the tutorial to know basic commands of metasploit here)
After loading the auxiliary module run the show options command to see what options we have to set.
You'll get a screen like this :
Now we have to just set the remote host address [RHOSTS] and THREADS.
Run following two commands.
msf > set RHOSTS remote_ip
In my case : msf auxiliary(smb_version) > set RHOSTS 127.0.0.1
msf > set THREADS 16
And finally to execute the module we use the 'exploit' command and press enter.
After the execution of module is completed it'll give you the version of remote system like this : Done :)
Fingerprinting remote Windows OS version using metasploit
Reviewed by Almas Malik
on
09:55
Rating:
No comments: