CumSwap

SMB Vuln Seeker w/ MSF.

Sep 16th, 2017
160
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.53 KB | None | 0 0
  1. SMB Vulnerability seeker via NSE(Nmap) using MSF to gather other information/s.
  2. *Uses the -iR tick, meaning no need for an actual [target/ip], it gathers n find random devices/servers[850];
  3. *Then checks for only open port/s[445].
  4. -See CVE details for further explanations.
  5. -The MSF credentials set are GLOBAL DEFAULTs, meaning it will work for anyone*
  6.  
  7. nmap -p 445 -v -iR 850 --open --script metasploit-info,smb-vuln-cve-2017-7494,smb-vuln-ms08-067,smb-vuln-ms17-010 --script-args metasploit-info.password=test,metasploit-info.username=msf
Add Comment
Please, Sign In to add comment