OpenVAS in Metasploit
2013-12-09 09:35
513 查看
一、//加载OpenVAS插件
msf > load openvas二、//连接openvas引擎的语法msf > openvas_connect[*] Usage:[*] openvas_connect username password host port <ssl-confirm>msf > openvas_connect admin admin 10.10.10.128 9390 ok三、//设置扫描目标 msf > openvas_target_create 2k03 10.10.10.130 metasploitable 四、//选择扫描策略msf > openvas_config_list[+] OpenVAS list of configsID Name-- ----0 Full and fast1 Full and fast ultimate2 Full and very deep3 Full and very deep ultimate4 empty五、//建立扫描任务并选择相应扫描策略msf > openvas_task_create[*] Usage: openvas_task_create <name> <comment> <config_id> <target_id>msf > openvas_task_create 2k03-scan "saomiao ba ji " 0 2六、//执行扫描任务msf > openvas_task_start[*] Usage: openvas_task_start <id>msf > openvas_task_start 2七、//查看任务进度msf > openvas_task_listmsf > openvas_task_list[+] OpenVAS list of tasksID Name Comment Status Progress-- ---- ------- ------ --------0 unnamed Done -11 jwc-scan Scan of JWC Done -12 2k03-scan saomiao ba ji Requested 1八、//下载扫描报告然后使用openvas_report_download<扫描报告ID><报告格式ID><存储路径><文件名>下载扫描报告。如代码清单3-26所示。msf > openvas_report_list //找到需要下载的扫描报告IDmsf > openvas_format_list//列出可供下载的扫描报告格式msf > openvas_report_download[*] Usage: openvas_report_download <report_id> <format_id> <path> <report_name>msf > openvas_report_download 2 1 /root 2k03_scan_report.html注意:下载时,报告名称后面要手动添加后缀,不然得到文件打开是一团乱码。
msf > load openvas二、//连接openvas引擎的语法msf > openvas_connect[*] Usage:[*] openvas_connect username password host port <ssl-confirm>msf > openvas_connect admin admin 10.10.10.128 9390 ok三、//设置扫描目标 msf > openvas_target_create 2k03 10.10.10.130 metasploitable 四、//选择扫描策略msf > openvas_config_list[+] OpenVAS list of configsID Name-- ----0 Full and fast1 Full and fast ultimate2 Full and very deep3 Full and very deep ultimate4 empty五、//建立扫描任务并选择相应扫描策略msf > openvas_task_create[*] Usage: openvas_task_create <name> <comment> <config_id> <target_id>msf > openvas_task_create 2k03-scan "saomiao ba ji " 0 2六、//执行扫描任务msf > openvas_task_start[*] Usage: openvas_task_start <id>msf > openvas_task_start 2七、//查看任务进度msf > openvas_task_listmsf > openvas_task_list[+] OpenVAS list of tasksID Name Comment Status Progress-- ---- ------- ------ --------0 unnamed Done -11 jwc-scan Scan of JWC Done -12 2k03-scan saomiao ba ji Requested 1八、//下载扫描报告然后使用openvas_report_download<扫描报告ID><报告格式ID><存储路径><文件名>下载扫描报告。如代码清单3-26所示。msf > openvas_report_list //找到需要下载的扫描报告IDmsf > openvas_format_list//列出可供下载的扫描报告格式msf > openvas_report_download[*] Usage: openvas_report_download <report_id> <format_id> <path> <report_name>msf > openvas_report_download 2 1 /root 2k03_scan_report.html注意:下载时,报告名称后面要手动添加后缀,不然得到文件打开是一团乱码。
相关文章推荐
- metasploit + openvas
- Metasploit with MYSQL in BackTrack 4 r2
- How to use a reverse shell in Metasploit
- Exploiting Metasploitable with Metasploit in Kali Linux
- metasploit中使用openvas
- Pwning-using-OpenVAS-and-Metasploit-Db_Autopwn-video
- Adding your own exploits and modules in Metasploit
- How to Update to Metasploit 4 and use Autopwn in Backtrack 5
- Kali linux 2016.2(Rolling)里Metasploit的OpenVAS
- All in one: pentest under metasploit
- Install OpenVAS Vulnerability Scanner In Ubuntu 15.04
- 在metasploit中使用OpenVAS
- Adding your own exploits and modules in Metasploit
- (摘录)(ASWP chap3)Describing Web Resource in RDF
- Advances in Applied Artificial Intelligence
- boot/include/lib_in_protect_mode.inc
- optimization methods in machine learning
- Exception in thread "main" java.lang.ClassCastException
- use case in Functional Specification