2012-01-13 09:41:53 +00:00
|
|
|
# portscan.rc
|
|
|
|
# Author: m-1-k-3 (Web: http://www.s3cur1ty.de / Twitter: @s3cur1ty_de)
|
|
|
|
|
|
|
|
# This Metasploit RC-File could be used to portscan the network via nmap or via the internal portscanner module
|
|
|
|
# it also uses the udp_sweep module
|
|
|
|
# RHOSTS is used from the global datastore
|
2012-02-03 14:23:33 +00:00
|
|
|
# VERBOSE is used from the global datastore
|
|
|
|
# you can define your own Nmap options via the global NMAPOPTS variable
|
2012-01-13 09:41:53 +00:00
|
|
|
|
|
|
|
<ruby>
|
2012-01-14 11:17:04 +00:00
|
|
|
#set ports for Metasploit tcp-portscanner (change this for your needs):
|
|
|
|
ports = "7,21,22,23,25,43,50,53,67,68,79,80,109,110,111,123,135,137,138,139,143,161,264,265,389,443,445,500,631,901,995,1241,1352,1433,1434,1521,1720,1723,3306,3389,3780,4662,5800,5801,5802,5803,5900,5901,5902,5903,6000,6666,8000,8080,8443,10000,10043,27374,27665"
|
|
|
|
|
2012-01-13 09:41:53 +00:00
|
|
|
if (framework.datastore['RHOSTS'] == nil)
|
2012-02-03 14:23:33 +00:00
|
|
|
print_status("you have to set RHOSTS globally ... exiting")
|
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
if (framework.datastore['NMAPOPTS'] != nil)
|
|
|
|
nmapopts = framework.datastore['NMAPOPTS']
|
|
|
|
else
|
2012-02-05 07:43:31 +00:00
|
|
|
#default-settings
|
|
|
|
nmapopts = "-PN -P0 -O -sSV"
|
2012-01-13 09:41:53 +00:00
|
|
|
end
|
|
|
|
|
2012-02-05 07:43:31 +00:00
|
|
|
#we look in the global datastore for a global VERBOSE option and use it
|
|
|
|
if (framework.datastore['VERBOSE'] == "true")
|
2012-02-03 14:23:33 +00:00
|
|
|
verbose = 1 #true
|
2012-01-14 11:17:04 +00:00
|
|
|
else
|
2012-02-03 14:23:33 +00:00
|
|
|
verbose = 0
|
2012-01-14 11:17:04 +00:00
|
|
|
end
|
|
|
|
|
2012-01-13 09:41:53 +00:00
|
|
|
if (framework.datastore['THREADS'] == nil) #default to 100 Threads
|
|
|
|
run_single("setg THREADS 100")
|
|
|
|
end
|
|
|
|
|
2012-02-05 07:43:31 +00:00
|
|
|
#default usage of nmap as portscanner
|
|
|
|
if (framework.datastore['NMAP'] == nil or framework.datastore['NMAP'] == "true")
|
2012-01-14 11:17:04 +00:00
|
|
|
nmap = 1
|
|
|
|
else
|
|
|
|
nmap = 0
|
2012-01-13 09:41:53 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
print_line("")
|
|
|
|
print_line("starting portscanners ...")
|
|
|
|
print_line("")
|
|
|
|
print_line("Module: udp_sweep")
|
|
|
|
run_single("use auxiliary/scanner/discovery/udp_sweep")
|
|
|
|
run_single("run -j")
|
2012-02-03 14:23:33 +00:00
|
|
|
run_single("back")
|
2012-01-13 09:41:53 +00:00
|
|
|
|
2012-01-14 11:17:04 +00:00
|
|
|
if ( nmap == 1 )
|
2012-02-03 14:23:33 +00:00
|
|
|
print_line("Module: db_nmap")
|
|
|
|
if (verbose == 1)
|
|
|
|
print_line("Using Nmap with the following options: -v -n #{nmapopts} #{framework.datastore['RHOSTS']}")
|
|
|
|
run_single("db_nmap -v -n #{nmapopts} #{framework.datastore['RHOSTS']}")
|
2012-01-14 11:17:04 +00:00
|
|
|
else
|
2012-02-03 14:23:33 +00:00
|
|
|
print_line("Using Nmap with the following options: -n #{nmapopts} #{framework.datastore['RHOSTS']}")
|
|
|
|
run_single("db_nmap -n #{nmapopts} #{framework.datastore['RHOSTS']}")
|
2012-01-14 11:17:04 +00:00
|
|
|
end
|
2012-01-13 09:41:53 +00:00
|
|
|
else
|
2012-02-03 14:23:33 +00:00
|
|
|
print_line("Module: portscan/tcp")
|
|
|
|
run_single("use auxiliary/scanner/portscan/tcp")
|
|
|
|
run_single("set PORTS #{ports}")
|
2012-01-13 09:41:53 +00:00
|
|
|
run_single("run -j")
|
2012-02-03 14:23:33 +00:00
|
|
|
run_single("back")
|
2012-01-13 09:41:53 +00:00
|
|
|
end
|
|
|
|
</ruby>
|