Auxiliary Modules
Auxiliary modules in Metasploit are used for tasks like scanning, discovery, and fuzzing. They can perform both TCP and UDP port scans and gather information from services like FTP, SSH, and HTTP. These modules are useful during both the information-gathering and post-exploitation phases of a penetration test. Once initial access is obtained, auxiliary modules can be used to discover hosts and scan ports on different network subnets. Their primary function is to extract information rather than exploit vulnerabilities directly.
Demo: Attacking, Pivoting, Discovery
Imagine you’re tasked with infiltrating a target network. Your first step is to use auxiliary modules to identify open ports on your initial target. After uncovering a vulnerable service, you exploit it, securing a foothold within the system. With this access, you pivot into a different network subnet, gaining a pathway to other systems. From there, you use auxiliary modules again to scan for open ports on a second target. How would you approach this plan?

Goals
Discover open ports on your first target?
Exploit the service running on the target to gain an initial foothold?
Utilize that foothold to pivot and access other systems on a different network subnet?
Scan for open ports on the second target using auxiliary modules?
Execution
autoroute: Sets up pivoting to access other subnets.
Network route refers to the path or set of rules that data packets follow to reach a destination across a network. In penetration testing, manipulating network routes (e.g., using the autoroute command in Meterpreter) allows pivoting, where access to one compromised system enables interaction with other network segments.
Meterpreter sessions are interactive command-line interfaces that allow an attacker to control a compromised system after an exploit succeeds. These sessions provide access to various tools for further exploitation, privilege escalation, and post-exploitation activities like running commands, uploading/downloading files, or pivoting.
Alternative Post Exploitation
Copying nmap to Victim 1
Copying a scanner to Victim 1
Last updated