Skip to content

Commit c56d796

Browse files
committed
finished cleanup
1 parent 15a29a1 commit c56d796

23 files changed

+31
-250
lines changed

documentation/modules/auxiliary/scanner/dcerpc/endpoint_mapper.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,10 @@ The endpoint_mapper module queries the EndPoint Mapper service of a remote syste
99
3. Do: ```set THREADS [number of threads]```
1010
4. Do: ```run```
1111

12-
In order to run the module, all we need to do is pass it a range of IP addresses, set the THREADS count, and let it go to work.
13-
1412
### Example Windows 2003, and Windows 7 Targets
1513

16-
**Running the scanner**
1714
```
15+
msf > use auxiliary/scanner/dcerpc/endpoint_mapper
1816
msf auxiliary(endpoint_mapper) > set RHOSTS 192.168.1.200-254
1917
RHOSTS => 192.168.1.200-254
2018
msf auxiliary(endpoint_mapper) > set THREADS 55

documentation/modules/auxiliary/scanner/dcerpc/hidden.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,10 @@ The hidden scanner connects to a given range of IP addresses and tries to locate
99
3. Do: ```set THREADS [number of threads]```
1010
4. Do: ```run```
1111

12-
As you can see, there are not many options to configure so we will just point it at some targets and let it run.
13-
1412
## Scenarios
1513

16-
**Running the scanner**
17-
1814
```
15+
msf > use auxiliary/scanner/dcerpc/hidden
1916
msf auxiliary(hidden) > set RHOSTS 192.168.1.200-254
2017
RHOSTS => 192.168.1.200-254
2118
msf auxiliary(hidden) > set THREADS 55
@@ -62,4 +59,4 @@ msf auxiliary(hidden) > run
6259
[*] Scanned 55 of 55 hosts (100% complete)
6360
[*] Auxiliary module execution completed
6461
msf auxiliary(hidden) >
65-
```
62+
```

documentation/modules/auxiliary/scanner/dcerpc/management.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ The dcerpc/management module scans a range of IP addresses and obtains informati
99
3. Do: ```set THREADS [number of threads]```
1010
4. Do: ```run```
1111

12-
There is minimal configuration required for this module; we simply need to set our THREADS value and the range of hosts we want scanned and run the module.
12+
## Scenarios
1313

1414
### Example Windows 2003, and Windows 7 Targets
1515

16-
**Running the scanner**
1716
```
17+
msf > use auxiliary/scanner/dcerpc/management
1818
msf auxiliary(management) > set RHOSTS 192.168.1.200-254
1919
RHOSTS => 192.168.1.200-254
2020
msf auxiliary(management) > set THREADS 55
@@ -84,4 +84,4 @@ msf auxiliary(management) > run
8484
[*] Scanned 55 of 55 hosts (100% complete)
8585
[*] Auxiliary module execution completed
8686
msf auxiliary(management) >
87-
```
87+
```

documentation/modules/auxiliary/scanner/dcerpc/tcp_dcerpc_auditor.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,12 +9,12 @@ The dcerpc/tcp_dcerpc_auditor module scans a range of IP addresses to determine
99
3. Do: ```set THREADS [number of threads]```
1010
4. Do: ```run```
1111

12-
To run this scanner, we just need to set our RHOSTS and THREADS values and let it run.
12+
## Scenarios
1313

1414
### Example Windows 2003, and Windows 7 Targets
1515

16-
**Running the scanner**
1716
```
17+
msf > use auxiliary/scanner/dcerpc/tcp_dcerpc_auditor
1818
msf auxiliary(tcp_dcerpc_auditor) > set RHOSTS 192.168.1.200-254
1919
RHOSTS => 192.168.1.200-254
2020
msf auxiliary(tcp_dcerpc_auditor) > set THREADS 55
@@ -40,4 +40,4 @@ The connection timed out (192.168.1.205:135).
4040
[*] Scanned 55 of 55 hosts (100% complete)
4141
[*] Auxiliary module execution completed
4242
msf auxiliary(tcp_dcerpc_auditor) >
43-
```
43+
```

documentation/modules/auxiliary/scanner/discovery/ipv6_neighbor.md

Lines changed: 1 addition & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -11,27 +11,10 @@ This auxiliary module probes the local network for IPv6 hosts that respond to Ne
1111
5. Do: ```set THREADS [number of threads]```
1212
6. Do: ```run```
1313

14-
In addition to setting our RHOSTS value, we also need to set our source MAC address(SMAC) and source host(SHOST) IP address. We then set our RHOSTS and THREADS values and let the scanner run.
15-
1614
## Scenarios
1715

18-
**Running the scanner**
1916
```
2017
msf > use auxiliary/scanner/discovery/ipv6_neighbor
21-
msf auxiliary(ipv6_neighbor) > show options
22-
23-
Module options:
24-
25-
Name Current Setting Required Description
26-
---- --------------- -------- -----------
27-
INTERFACE no The name of the interface
28-
PCAPFILE no The name of the PCAP capture file to process
29-
RHOSTS yes The target address range or CIDR identifier
30-
SHOST yes Source IP Address
31-
SMAC yes Source MAC Address
32-
THREADS 1 yes The number of concurrent threads
33-
TIMEOUT 500 yes The number of seconds to wait for new data
34-
3518
msf auxiliary(ipv6_neighbor) > set RHOSTS 192.168.1.2-254
3619
RHOSTS => 192.168.1.200-254
3720
msf auxiliary(ipv6_neighbor) > set SHOST 192.168.1.101
@@ -64,4 +47,4 @@ msf auxiliary(ipv6_neighbor) > run
6447
[*] Scanned 253 of 253 hosts (100% complete)
6548
[*] Auxiliary module execution completed
6649
msf auxiliary(ipv6_neighbor) >
67-
```
50+
```

documentation/modules/auxiliary/scanner/discovery/udp_sweep.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,8 @@ The `udp_sweep` module scans across a given range of hosts to detect commonly av
99
3. Do: ```set THREADS [number of threads]```
1010
4. Do: ```run```
1111

12-
To configure this module, just set the RHOSTS and THREADS values and run it.
13-
1412
## Scenarios
1513

16-
**Running the scanner**
1714
```
1815
msf > use auxiliary/scanner/discovery/udp_sweep
1916
msf auxiliary(udp_sweep) > set RHOSTS 192.168.1.2-254
@@ -42,4 +39,4 @@ msf auxiliary(udp_sweep) > run
4239
[*] Scanned 253 of 253 hosts (100% complete)
4340
[*] Auxiliary module execution completed
4441
msf auxiliary(udp_sweep) >
45-
```
42+
```

documentation/modules/auxiliary/scanner/http/cert.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,6 @@ This module is a useful administrative scanner that allows you to cover a subnet
99
3. Do: ```set THREADS [number of threads]```
1010
4. Do: ```run```
1111

12-
Just set target RHOSTS and THREADS values and let it do its thing.
13-
1412
## Scenarios
1513

1614
```
@@ -32,7 +30,7 @@ msf auxiliary(cert) >
3230

3331
## Confirming
3432

35-
The following are other industry tools which can also be used.
33+
The following are other industry tools which can also be used. Note that the targets are not the same as those used in the previous documentation.
3634

3735
### [nmap](https://nmap.org/nsedoc/scripts/ssl-cert.html)
3836

documentation/modules/auxiliary/scanner/http/dir_scanner.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This module scans one or more web servers for interesting directories that can b
1111
## Scenarios
1212

1313
```
14-
> use auxiliary/scanner/http/dir_scanner
14+
msf > use auxiliary/scanner/http/dir_scanner
1515
msf auxiliary(dir_scanner) > set RHOSTS 192.168.1.201
1616
RHOSTS => 192.168.1.201
1717
msf auxiliary(dir_scanner) > run
@@ -34,7 +34,7 @@ msf auxiliary(dir_scanner) >
3434

3535
## Confirming
3636

37-
The following are other industry tools which can also be used.
37+
The following are other industry tools which can also be used. Note that the targets are not the same as those used in the previous documentation.
3838

3939
### [dirb](http://dirb.sourceforge.net/)
4040

documentation/modules/auxiliary/scanner/http/dir_webdav_unicode_bypass.md

Lines changed: 1 addition & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
## Description
22

3-
The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.0 allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files, via a %c0%af (Unicode / character) at an arbitrary position in the URI, as demonstrated by inserting %c0%af into a `/protected/` initial pathname component to bypass the password protection on the protected\ folder, aka "IIS 5.1 and 6.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1122. More info about this vulnerability can be found in [cve-2009-1535](http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1535).
3+
The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.0 allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files, via a `%c0%af` (Unicode / character) at an arbitrary position in the URI, as demonstrated by inserting `%c0%af` into a `/protected/` initial pathname component to bypass the password protection on the `protected` folder, aka "IIS 5.1 and 6.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1122. More info about this vulnerability can be found in [CVE-2009-1535](http://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1535).
44

55
## Verification Steps
66

@@ -13,23 +13,6 @@ The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.
1313

1414
```
1515
msf > use auxiliary/scanner/http/dir_webdav_unicode_bypass
16-
msf auxiliary(dir_webdav_unicode_bypass) > show options
17-
18-
Module options (auxiliary/scanner/http/dir_webdav_unicode_bypass):
19-
20-
Name Current Setting Required Description
21-
---- --------------- -------- -----------
22-
DICTIONARY /usr/share/metasploit-framework/data/wmap/wmap_dirs.txt no Path of word dictionary to use
23-
ERROR_CODE 404 yes Error code for non existent directory
24-
HTTP404S /usr/share/metasploit-framework/data/wmap/wmap_404s.txt no Path of 404 signatures to use
25-
PATH / yes The path to identify files
26-
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
27-
RHOSTS yes The target address range or CIDR identifier
28-
RPORT 80 yes The target port (TCP)
29-
SSL false no Negotiate SSL/TLS for outgoing connections
30-
THREADS 1 yes The number of concurrent threads
31-
VHOST no HTTP server virtual host
32-
3316
msf auxiliary(dir_webdav_unicode_bypass) > set RHOSTS 192.168.1.200-254
3417
RHOSTS => 192.168.1.200-254
3518
msf auxiliary(dir_webdav_unicode_bypass) > set THREADS 20

documentation/modules/auxiliary/scanner/http/http_login.md

Lines changed: 1 addition & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
## Description
22

3-
This module is a brute-force login scanner that attempts to authenticate to a system using HTTP authentication. More info can be found [here](https://www.cvedetails.com/cve/cve-1999-0502).
3+
This module is a brute-force login scanner that attempts to authenticate to a system using HTTP authentication. More info can be found in [cve-1999-0502](https://www.cvedetails.com/cve/cve-1999-0502).
44

55
## Verification Steps
66

@@ -11,35 +11,8 @@ This module is a brute-force login scanner that attempts to authenticate to a sy
1111

1212
## Scenarios
1313

14-
**Running the scanner**
15-
1614
```
1715
msf > use auxiliary/scanner/http/http_login
18-
msf auxiliary(http_login) > show options
19-
20-
Module options (auxiliary/scanner/http/http_login):
21-
22-
Name Current Setting Required Description
23-
---- --------------- -------- -----------
24-
AUTH_URI no The URI to authenticate against (default:auto)
25-
BLANK_PASSWORDS false no Try blank passwords for all users
26-
BRUTEFORCE_SPEED 5 yes How fast to bruteforce, from 0 to 5
27-
DB_ALL_CREDS false no Try each user/password couple stored in the current database
28-
DB_ALL_PASS false no Add all passwords in the current database to the list
29-
DB_ALL_USERS false no Add all users in the current database to the list
30-
PASS_FILE /usr/share/metasploit-framework/data/wordlists/http_default_pass.txt no File containing passwords, one per line
31-
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
32-
REQUESTTYPE GET no Use HTTP-GET or HTTP-PUT for Digest-Auth, PROPFIND for WebDAV (default:GET)
33-
RHOSTS yes The target address range or CIDR identifier
34-
RPORT 80 yes The target port (TCP)
35-
SSL false no Negotiate SSL/TLS for outgoing connections
36-
STOP_ON_SUCCESS false yes Stop guessing when a credential works for a host
37-
THREADS 1 yes The number of concurrent threads
38-
USERPASS_FILE /usr/share/metasploit-framework/data/wordlists/http_default_userpass.txt no File containing users and passwords separated by space, one pair per line
39-
USER_AS_PASS false no Try the username as the password for all users
40-
USER_FILE /usr/share/metasploit-framework/data/wordlists/http_default_users.txt no File containing users, one per line
41-
VERBOSE true yes Whether to print output for all attempts
42-
VHOST
4316
msf auxiliary(http_login) > set AUTH_URI /xampp/
4417
AUTH_URI => /xampp/
4518
msf auxiliary(http_login) > set RHOSTS 192.168.1.201

0 commit comments

Comments
 (0)