Skip to content

Commit ea232cb

Browse files
committed
esx_fingerprint
1 parent f0e3a1f commit ea232cb

File tree

1 file changed

+49
-0
lines changed

1 file changed

+49
-0
lines changed
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
## Vulnerable Application
2+
3+
This module works against VMWare ESX and ESXi. Both can be downloaded from VMWare from [here](https://my.vmware.com/en/web/vmware/evalcenter?p=free-esxi6), free account signup required.
4+
5+
## Verification Steps
6+
7+
1. Start msfconsole
8+
2. Do: `use auxiliary/scanner/vmware/esx_fingerprint`
9+
3. Do: `set rhosts`
10+
4. Do: `run`
11+
12+
## Scenarios
13+
14+
A run against ESXi 6.0.0 Update 2 (Build 4600944)
15+
16+
```
17+
msf > use auxiliary/scanner/vmware/esx_fingerprint
18+
msf auxiliary(esx_fingerprint) > set rhosts 10.1.2.5
19+
rhosts => 10.1.2.5
20+
msf auxiliary(esx_fingerprint) > run
21+
22+
[+] 10.1.2.5:443 - Identified VMware ESXi 6.0.0 build-4600944
23+
[*] Scanned 1 of 1 hosts (100% complete)
24+
[*] Auxiliary module execution completed
25+
msf auxiliary(esx_fingerprint) >
26+
```
27+
28+
## Confirming using NMAP
29+
30+
Utilizing [vmware-version](https://nmap.org/nsedoc/scripts/vmware-version.html)
31+
32+
**Note**: This script was not installed by default on Kali at the time of writing this document.
33+
It can be installed via: `wget -O /usr/share/nmap/scripts/vmware-version.nse https://svn.nmap.org/nmap/scripts/vmware-version.nse`
34+
35+
```
36+
nmap --script vmware-version -p443 10.1.2.5
37+
38+
Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-11 21:14 EDT
39+
Nmap scan report for 10.1.2.5
40+
Host is up (0.17s latency).
41+
PORT STATE SERVICE
42+
443/tcp open https
43+
| vmware-version:
44+
| Server version: VMware ESXi 6.0.0
45+
| Build: 4600944
46+
| Locale version: INTL 000
47+
| OS type: vmnix-x86
48+
|_ Product Line ID: embeddedEsx
49+
```

0 commit comments

Comments
 (0)