Tag Archives: Pass the hash

Metasploit – Attacks

Direct Attack The attack consists on locate a vulnerable service in a server and use an exploit to obtain access to the system. Port scan and scanners to identify versions Use auxiliary/scanner/portscan/tcp Use auxiliary/scanner/smb/smb_version Use auxiliary/scanner/http/http_version Use show options and set <option> to configure the exploit Search or download an exploit for the vulnerable serviceā€¦ Read More »