Mastering Metasploit
上QQ阅读APP看书,第一时间看更新

Gathering intelligence

As discussed earlier, the gathering intelligence phase revolves around collecting as much information as possible about the target. This includes performing active and passive scans, which include port scanning, banner grabbing, and various other scans. The target under the current scenario is a single IP address, so here, we can skip gathering passive information and can continue with the active information gathering methodology only.

Let's start with the footprinting phase, which includes port scanning, banner grabbing, ping scans to check whether the system is live or not, and service detection scans.

To conduct footprinting and scanning, Nmap proves as one of the finest tools available. Reports generated by Nmap can be easily imported into Metasploit. However, Metasploit has inbuilt Nmap functionalities, which can be used to perform Nmap scans from within the Metasploit framework console and store the results in the database.

Refer to https://nmap.org/bennieston-tutorial/ for more information on Nmap scans.

Refer to an excellent book on Nmap at: https://www.packtpub.com/networking-and-servers/nmap-6-network-exploration-and-security-auditing-cookbook.