Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- +--------------------------------+--------+------+-----------------------------------------------------------------------------+
- | Module | Type | Safe | Description |
- +--------------------------------+--------+------+-----------------------------------------------------------------------------+
- | exploit_hydrasmbpassword | action | 2 | Attempt to bruteforce SMB passwords |
- | exploit_jexboss | action | 4 | Run JexBoss and look for vulnerabilities |
- | exploit_msf_javarmi | action | 5 | Attempt to Exploit A Java RMI Service |
- | exploit_msf_jboss_maindeployer | action | 3 | Attempt to gain shell via Jboss |
- | exploit_msf_ms08_067 | action | 4 | Attempt to exploit MS08-067 |
- | exploit_msf_ms17_010 | action | 4 | Attempt to exploit MS17-010 |
- | exploit_msf_psexec_pth | action | 4 | Attempt to authenticate via PSEXEC PTH |
- | exploit_msf_tomcat_mgr_login | action | 4 | Attempt to determine if a tomcat instance has default creds |
- | exploit_msf_tomcat_mgr_upload | action | 3 | Attempt to gain shell via Tomcat |
- | exploit_responder | action | 3 | Run Responder and watch for hashes |
- | post_impacketsecretsdump | action | 5 | Dump passwords and hashes |
- | post_msf_dumphashes | action | 4 | Gather hashes from MSF Sessions |
- | post_msf_gathersessioninfo | action | 4 | Get Info about any new sessions |
- | scan_anonftp | action | 4 | Test for Anonymous FTP |
- | scan_anonldap | action | 5 | Test for Anonymous LDAP Searches |
- | scan_gethostname | action | 5 | Determine the hostname for each IP |
- | scan_httpoptions | action | 5 | Get HTTP Options |
- | scan_httpscreenshot | action | 5 | Get Screen Shot of Web Pages |
- | scan_httpserverversion | action | 5 | Get HTTP Server Version |
- | scan_msf_jboss_vulnscan | action | 4 | Attempt to determine if a jboss instance has default creds |
- | scan_msf_openx11 | action | 5 | Attempt Login To Open X11 Service |
- | scan_msf_smbuserenum | action | 5 | Get List of Users From SMB |
- | scan_msf_snmpenumshares | action | 5 | Enumerate SMB Shares via LanManager OID Values |
- | scan_msf_snmpenumusers | action | 5 | Enumerate Local User Accounts Using LanManager/psProcessUsername OID Values |
- | scan_msf_snmplogin | action | 5 | Attempt Login Using Common Community Strings |
- | scan_msf_vncnoneauth | action | 5 | Detect VNC Services with the None authentication type |
- | scan_nmap_msvulnscan | action | 4 | Nmap MS Vuln Scan |
- | scan_nmap_nfsshares | action | 5 | NMap NFS Share Scan |
- | scan_nmap_smbshares | action | 5 | NMap SMB Share Scan |
- | scan_nmap_smbsigning | action | 5 | NMap SMB-Signing Scan |
- | scan_nmap_sslscan | action | 5 | NMap SSL Scan |
- | scan_nmap_vnc_auth_bypass | action | 5 | NMap VNC Auth Bypass |
- | scan_nmap_vncbrute | action | 5 | NMap VNC Brute Scan |
- | scan_openx11 | action | 5 | Attempt Login To Open X11 Servicei and Get Screenshot |
- | scan_rpcclient_nullsession | action | 5 | Test for NULL Session |
- | scan_rpcclient_userenum | action | 5 | Get List of Users From SMB |
- | scan_searchsmbshare | action | 4 | Search files on SMB Shares |
- | scan_smbclient_nullsession | action | 5 | Test for NULL Session |
- | scan_snmpwalk | action | 5 | Run snmpwalk using found community string |
- | scan_sslscan | action | 5 | Determine SSL protocols and ciphers |
- | scan_testsslserver | action | 5 | Determine SSL protocols and ciphers |
- | dictload | input | None | Load DICT Input File |
- | nmaploadxml | input | None | Load NMap XML File |
- | reportgen | report | None | Generate HTML Report |
- +--------------------------------+--------+------+-----------------------------------------------------------------------------+
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement