Vulnerability Scanning With Nessus

Posted by r3kind1e on January 10, 2023

Vulnerability Scanning With Nessus

Vulnerability Scanning With Nessus

Nessus is a proprietary vulnerability scanner developed by Tenable.

We can utilize Nessus to perform a vulnerability scan on a target system, after which, we can import the Nessus results in to MSF for analysis and exploitation.

Nessus automates the process of identifying vulnerabilities and also provides us with information pertinent to a vulnerability like the CVE code.

We can use the free version of Nessus (Nessus Essential), which allows us to scan up to 16 IPs.

使用 Nessus 进行漏洞扫描

使用 Nessus 进行漏洞扫描

Nessus 是由 Tenable 开发的专有漏洞扫描器。

我们可以利用 Nessus 对目标系统进行漏洞扫描,之后我们可以将 Nessus 结果导入 MSF 进行分析和利用。

Nessus 自动执行识别漏洞的过程,并为我们提供与漏洞相关的信息,例如 CVE 代码。

我们可以使用免费版的 Nessus(Nessus Essential),它允许我们最多扫描 16 个 IP。

Lab Environment

For the purposes of demonstrating the vulnerability scanning process, we will be utilizing an intentionally vulnerable virtual machine called Metasploitable3 that is based on Windows Server 2008.

Metasploitable3 was developed by Rapid7 to demonstrate how MSF can be used to perform exploitation of a Windows System.

Instruction on how this VM can be setup can be found here: https://bit.ly/3kASwns

实验室环境

为了演示漏洞扫描过程,我们将使用一个名为 Metasploitable3 的故意易受攻击的虚拟机,该虚拟机基于 Windows Server 2008。

Metasploitable3 由 Rapid7 开发,用于演示如何使用 MSF 执行 Windows 系统的利用。

可以在此处找到有关如何设置此 VM 的说明:https://bit.ly/3kASwns

Video

When it comes down to how Nessus performs vulnerability scanning, it will start off by performing host discovery. So it actually discovers the active hosts on a network. And if we provide a single IP, it will ping the device or the host to see if it’s up. After it has determined that that particular host is up, it will then begin performing port scanning and then grabbing the banners or the service information of all the services that are currently running on the open ports. It then utilizes its database. And this is what separates a manual vulnerability scanning from automated vulnerability scanning, is that pieces of software like Nessus have a vulnerability database that contains a list of services and exact versions and the vulnerabilities or exploits are pertinent to that specific version of the service. So it will then perform a check or a cross-reference between the services that are running on the target and the services that are currently within the vulnerability database and will then discover whether any of these services are vulnerable to a particular exploit, after which it will provide us with the CVE and any reference links that we can use to learn more about the vulnerability. And if there is a Metasploit module available, it will also provide us with that information.

1
2
3
4
chmod +x Nessus-10.0.0-debian6_amd64.deb
sudo dpkg -i Nessus-10.0.0-debian6_amd64.deb
sudo systemctl start nessusd.service
sudo systemctl status nessusd.service

New Scan->Basic Network Scan

1
2
Name: MS3
Targets: 10.10.10.4

Launch an authenticated vulnerability scan, you can provide the credentials here: Credentials.

You can also access or specify specific plugins that you want to utilize for your scan: Plugins.

Settings->DISCOVERY

Settings->ASSESSMENT

Settings->REPORT

Settings->ADVANCED

Save->Launch

Click on the Scan.

Vulnerabilities->Filter

1
Metasploit Exploit Framework->is equal to->true
1
Severity->is equal to->High

Export this report or this particular scan, and then import it into the Metasploit Framework.

Export->Nessus: an XML file.

Ensure that the postgresql database is started, because we’ll be importing the scan results into the database.

1
2
service postgresql start
msfconsole -q

Create a new workspace.

1
workspace -a MS3_Nessus

Import the results. It will give you an idea of all the tools that you can import, or rather the information from any of these tools.

1
db_import

Specify the location where you saved the report, or rather the output from Nessus.

1
db_import /home/kali/Downloads/MS3_fkthix.nessus
1
2
hosts
services

This will give you an idea of all vulnerabilities and their target port rather.

1
vulns

We’re looking for smb, which is port 445.

1
services

Limit the vulnerabilities displayed.

1
vulns -p 445

These are all of the vulnerabilities of that affect this version of SMB that’s running on the target.

How do we utilize this information to obtain exploits?

We can utilize the CVE code for each of these.

Take a look at probably some of the other ports.

1
2
3
vulns -p 80
vulns -p 8080
vulns -p 21
1
vulns

When it comes down to searching for exploit modules within the MSF with a CVE code.

All we need to do is utilize or specify the CVE year.

So if the exploit was released or rather the vulnerability was disclosed in the year 2017, we can copy that.

1
search cve:2017 name:smb
1
2
search cve:2012 name:rdp
search MS12-020
1
2
3
4
5
search cve:2015 name:ManageEngine
use exploit/windows/http/manageengine_connectionid_write
show options
set RHOSTS 10.10.10.4
run
1
2
3
4
sessions
sessions 1
sysinfo
exit

Take a look at Nessus.

1
Filter->Metasploit Exploit Framework->is equal to->true

We can use the results here to identify the various exploits or the exploit modules we can utilize.

For example, if we take a look at this RDP exploit.

1
Microsoft RDP RCE (CVE-2019-0708)(BlueKeep)(uncredentialed check)
1
2
back
search cve:2019 name:rdp

If you can find the exact module name: Exploitable With, you can then copy it directly from here.

1
2
Metasploit (MS12-020 Microsoft Remote Desktop Checker)
Metasploit (PHP CGI Argument Injection)
1
search PHP CGI Argument Injection

Whenver you’re interacting or utilizing the MSF, take advantage of the various third party tools that can be integrated or interpolated with the MSF. And examples of that are Nessus, Nmap, so on and so forth.

You should be familiar with how to essentially get the Nessus Essentials installed on Kali Linux, and then how to set it up, and how to use it to perform a vulnerability scan. And then how to export the results from a vulnerability scan, and then import them into the MSF database. And then how to sort through all of that data and find the vulnerabilities, or how to find the exploit codes for the specific vulnerabilities.

1
2
3
hosts
services
vulns

You can also utilize the Nessus Web Interface to find the exact MSF module names during exploitation.

Home Lab

Environment: Microsoft Windows Server 2008 R2 Standard Target: 192.168.248.133

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
┌──(root㉿kali)-[~]
└─# systemctl start nessusd.service
                                                                                                                                                                                             
┌──(root㉿kali)-[~]
└─# systemctl status nessusd.service
● nessusd.service - The Nessus Vulnerability Scanner
     Loaded: loaded (/lib/systemd/system/nessusd.service; disabled; vendor preset: disabled)
     Active: active (running) since Mon 2023-01-09 22:32:07 EST; 15s ago
   Main PID: 10189 (nessus-service)
      Tasks: 16 (limit: 2283)
     Memory: 1023.4M
        CPU: 20.492s
     CGroup: /system.slice/nessusd.service
             ├─10189 /opt/nessus/sbin/nessus-service -q
             └─10191 nessusd -q

Jan 09 22:32:07 kali systemd[1]: Started The Nessus Vulnerability Scanner.
Jan 09 22:32:17 kali nessus-service[10191]: Cached 251 plugin libs in 100msec
Jan 09 22:32:17 kali nessus-service[10191]: Cached 251 plugin libs in 39msec

1
2
3
4
5
6
7
8
9
┌──(root㉿kali)-[~]
└─# /opt/nessus/sbin/nessuscli lsuser                
kali
                                                                                                                                                                                             
┌──(root㉿kali)-[~]
└─# /opt/nessus/sbin/nessuscli chpasswd kali         
New password: 
New password (again): 
Password changed for kali
1
/root/Downloads/MS3_lkffvk.nessus
1
2
3
msf6 > workspace -a MS3_Nessus
[*] Added workspace: MS3_Nessus
[*] Workspace: MS3_Nessus
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
Usage: db_import <filename> [file2...]

Filenames can be globs like *.xml, or **/*.xml which will search recursively
Currently supported file types include:
    Acunetix
    Amap Log
    Amap Log -m
    Appscan
    Burp Session XML
    Burp Issue XML
    CI
    Foundstone
    FusionVM XML
    Group Policy Preferences Credentials
    IP Address List
    IP360 ASPL
    IP360 XML v3
    Libpcap Packet Capture
    Masscan XML
    Metasploit PWDump Export
    Metasploit XML
    Metasploit Zip Export
    Microsoft Baseline Security Analyzer
    NeXpose Simple XML
    NeXpose XML Report
    Nessus NBE Report
    Nessus XML (v1)
    Nessus XML (v2)
    NetSparker XML
    Nikto XML
    Nmap XML
    OpenVAS Report
    OpenVAS XML
    Outpost24 XML
    Qualys Asset XML
    Qualys Scan XML
    Retina XML
    Spiceworks CSV Export
    Wapiti XML
1
2
3
4
msf6 > db_import /root/Downloads/MS3_lkffvk.nessus
[*] Importing 'Nessus XML (v2)' data
[*] Importing host 192.168.248.133
[*] Successfully imported /root/Downloads/MS3_lkffvk.nessus
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
msf6 > hosts

Hosts
=====

address          mac                name             os_name       os_flavor  os_sp  purpose  info  comments
-------          ---                ----             -------       ---------  -----  -------  ----  --------
192.168.248.133  00:0c:29:f7:9e:3f  192.168.248.133  Windows 2008                    server

msf6 > services
Services
========

host             port   proto  name        state  info
----             ----   -----  ----        -----  ----
192.168.248.133  135    tcp    epmap       open
192.168.248.133  137    udp    netbios-ns  open
192.168.248.133  139    tcp    smb         open
192.168.248.133  445    tcp    cifs        open
192.168.248.133  3389   tcp                open
192.168.248.133  5355   udp    llmnr       open
192.168.248.133  49152  tcp    dce-rpc     open
192.168.248.133  49153  tcp    dce-rpc     open
192.168.248.133  49154  tcp    dce-rpc     open
192.168.248.133  49155  tcp    dce-rpc     open
192.168.248.133  49156  tcp    dce-rpc     open
192.168.248.133  49157  tcp    dce-rpc     open
192.168.248.133  49158  tcp    dce-rpc     open
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
msf6 > vulns

Vulnerabilities
===============

Timestamp                Host             Name                                                                     References
---------                ----             ----                                                                     ----------
2023-01-10 04:39:32 UTC  192.168.248.133  OS Security Patch Assessment Not Available                               IAVB-0001-B-0515,NSS-117886
2023-01-10 04:39:32 UTC  192.168.248.133  Nessus Scan Information                                                  NSS-19506
2023-01-10 04:39:32 UTC  192.168.248.133  Common Platform Enumeration (CPE)                                        NSS-45590
2023-01-10 04:39:32 UTC  192.168.248.133  Target Credential Status by Authentication Protocol - No Credentials Pr  IAVB-0001-B-0504,NSS-110723
                                          ovided
2023-01-10 04:39:32 UTC  192.168.248.133  MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (  CVE-2016-0128,BID-86002,MSFT-MS16-047,CERT-813296,IAVA-2016-A-0093,MSKB-
                                          Badlock) (uncredentialed check)                                          3148527,MSKB-3149090,MSKB-3147461,MSKB-3147458,NSS-90510
2023-01-10 04:39:32 UTC  192.168.248.133  Device Type                                                              NSS-54615
2023-01-10 04:39:32 UTC  192.168.248.133  MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (E  CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CV
                                          TERNALBLUE) (ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaC  E-2017-0148,BID-96703,BID-96704,BID-96705,BID-96706,BID-96707,BID-96709,
                                          ry) (EternalRocks) (Petya) (uncredentialed check)                        EDB-ID-41891,EDB-ID-41987,MSFT-MS17-010,IAVA-2017-A-0065,MSKB-4012212,MS
                                                                                                                   KB-4012213,MSKB-4012214,MSKB-4012215,MSKB-4012216,MSKB-4012217,MSKB-4012
                                                                                                                   606,MSKB-4013198,MSKB-4013429,MSKB-4012598,CISA-KNOWN-EXPLOITED-2022/05/
                                                                                                                   03,CISA-KNOWN-EXPLOITED-2022/08/10,CISA-KNOWN-EXPLOITED-2022/04/15,CISA-
                                                                                                                   KNOWN-EXPLOITED-2022/04/27,CISA-KNOWN-EXPLOITED-2022/06/14,MSF-SMB DOUBL
                                                                                                                   EPULSAR Remote Code Execution,NSS-97833
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Cipher Block Chaining Cipher Suites Supported                        NSS-70544
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Session Resume Supported                                             NSS-51891
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Medium Strength Cipher Suites Supported (SWEET32)                    CVE-2016-2183,NSS-42873
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Perfect Forward Secrecy Cipher Suites Supported                      NSS-57041
2023-01-10 04:39:33 UTC  192.168.248.133  SSL/TLS Recommended Cipher Suites                                        NSS-156899
2023-01-10 04:39:33 UTC  192.168.248.133  SSL RC4 Cipher Suites Supported (Bar Mitzvah)                            CVE-2013-2566,CVE-2015-2808,BID-58796,BID-73684,NSS-65821
2023-01-10 04:39:33 UTC  192.168.248.133  TLS Version 1.0 Protocol Detection                                       NSS-104743
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Cipher Suites Supported                                              NSS-21643
2023-01-10 04:39:33 UTC  192.168.248.133  Unsupported Windows OS (remote)                                          IAVA-0001-A-0501,NSS-108797
2023-01-10 04:39:33 UTC  192.168.248.133  OS Identification                                                        NSS-11936
2023-01-10 04:39:33 UTC  192.168.248.133  Ethernet Card Manufacturer Detection                                     NSS-35716
2023-01-10 04:39:33 UTC  192.168.248.133  VMware Virtual Machine Detection                                         NSS-20094
2023-01-10 04:39:33 UTC  192.168.248.133  Ethernet MAC Addresses                                                   NSS-86420
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Self-Signed Certificate                                              NSS-57582
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Certificate Cannot Be Trusted                                        NSS-51192
2023-01-10 04:39:33 UTC  192.168.248.133  Microsoft Windows SMB NativeLanManager Remote System Information Disclo  NSS-10785
                                          sure
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Certificate Signed Using Weak Hashing Algorithm                      CVE-2004-2761,BID-11849,BID-33065,CERT-836068,CWE-310,NSS-35291
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Certificate Information                                              NSS-10863
2023-01-10 04:39:33 UTC  192.168.248.133  SSL / TLS Versions Supported                                             NSS-56984
2023-01-10 04:39:33 UTC  192.168.248.133  Terminal Services Use SSL/TLS                                            NSS-64814
2023-01-10 04:39:33 UTC  192.168.248.133  SMB Signing not required                                                 NSS-57608
2023-01-10 04:39:33 UTC  192.168.248.133  Traceroute Information                                                   NSS-10287
2023-01-10 04:39:33 UTC  192.168.248.133  TCP/IP Timestamps Supported                                              NSS-25220
2023-01-10 04:39:33 UTC  192.168.248.133  Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)        NSS-106716
2023-01-10 04:39:33 UTC  192.168.248.133  Link-Local Multicast Name Resolution (LLMNR) Detection                   NSS-53513
2023-01-10 04:39:33 UTC  192.168.248.133  ICMP Timestamp Request Remote Date Disclosure                            CVE-1999-0524,CWE-200,NSS-10114
2023-01-10 04:39:33 UTC  192.168.248.133  Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed c  IAVT-0001-T-0710,NSS-96982
                                          heck)
2023-01-10 04:39:33 UTC  192.168.248.133  Microsoft Windows SMB Versions Supported (remote check)                  NSS-100871
2023-01-10 04:39:33 UTC  192.168.248.133  Nessus Windows Scan Not Performed with Admin Privileges                  IAVB-0001-B-0505,NSS-24786
2023-01-10 04:39:33 UTC  192.168.248.133  WMI Not Available                                                        NSS-135860
2023-01-10 04:39:33 UTC  192.168.248.133  Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Regis  IAVB-0001-B-0506,NSS-26917
                                          try
2023-01-10 04:39:33 UTC  192.168.248.133  Nessus SYN scanner                                                       NSS-11219
2023-01-10 04:39:33 UTC  192.168.248.133  Nessus SYN scanner                                                       NSS-11219
2023-01-10 04:39:33 UTC  192.168.248.133  Nessus SYN scanner                                                       NSS-11219
2023-01-10 04:39:33 UTC  192.168.248.133  Nessus SYN scanner                                                       NSS-11219
2023-01-10 04:39:33 UTC  192.168.248.133  Windows NetBIOS / SMB Remote Host Information Disclosure                 NSS-10150
2023-01-10 04:39:33 UTC  192.168.248.133  DCE Services Enumeration                                                 NSS-10736
2023-01-10 04:39:33 UTC  192.168.248.133  DCE Services Enumeration                                                 NSS-10736
2023-01-10 04:39:33 UTC  192.168.248.133  DCE Services Enumeration                                                 NSS-10736
2023-01-10 04:39:33 UTC  192.168.248.133  DCE Services Enumeration                                                 NSS-10736
2023-01-10 04:39:33 UTC  192.168.248.133  DCE Services Enumeration                                                 NSS-10736
2023-01-10 04:39:33 UTC  192.168.248.133  DCE Services Enumeration                                                 NSS-10736
2023-01-10 04:39:33 UTC  192.168.248.133  DCE Services Enumeration                                                 NSS-10736
2023-01-10 04:39:33 UTC  192.168.248.133  DCE Services Enumeration                                                 NSS-10736
2023-01-10 04:39:33 UTC  192.168.248.133  DCE Services Enumeration                                                 NSS-10736
2023-01-10 04:39:33 UTC  192.168.248.133  Microsoft Windows SMB Service Detection                                  NSS-11011
2023-01-10 04:39:33 UTC  192.168.248.133  Microsoft Windows SMB Service Detection                                  NSS-11011
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
msf6 > vulns -p 445

Vulnerabilities
===============

Timestamp                Host             Name                                                                     References
---------                ----             ----                                                                     ----------
2023-01-10 04:39:32 UTC  192.168.248.133  MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (E  CVE-2017-0143,CVE-2017-0144,CVE-2017-0145,CVE-2017-0146,CVE-2017-0147,CV
                                          TERNALBLUE) (ETERNALCHAMPION) (ETERNALROMANCE) (ETERNALSYNERGY) (WannaC  E-2017-0148,BID-96703,BID-96704,BID-96705,BID-96706,BID-96707,BID-96709,
                                          ry) (EternalRocks) (Petya) (uncredentialed check)                        EDB-ID-41891,EDB-ID-41987,MSFT-MS17-010,IAVA-2017-A-0065,MSKB-4012212,MS
                                                                                                                   KB-4012213,MSKB-4012214,MSKB-4012215,MSKB-4012216,MSKB-4012217,MSKB-4012
                                                                                                                   606,MSKB-4013198,MSKB-4013429,MSKB-4012598,CISA-KNOWN-EXPLOITED-2022/05/
                                                                                                                   03,CISA-KNOWN-EXPLOITED-2022/08/10,CISA-KNOWN-EXPLOITED-2022/04/15,CISA-
                                                                                                                   KNOWN-EXPLOITED-2022/04/27,CISA-KNOWN-EXPLOITED-2022/06/14,MSF-SMB DOUBL
                                                                                                                   EPULSAR Remote Code Execution,NSS-97833
2023-01-10 04:39:33 UTC  192.168.248.133  Microsoft Windows SMB NativeLanManager Remote System Information Disclo  NSS-10785
                                          sure
2023-01-10 04:39:33 UTC  192.168.248.133  SMB Signing not required                                                 NSS-57608
2023-01-10 04:39:33 UTC  192.168.248.133  Microsoft Windows SMB2 and SMB3 Dialects Supported (remote check)        NSS-106716
2023-01-10 04:39:33 UTC  192.168.248.133  Server Message Block (SMB) Protocol Version 1 Enabled (uncredentialed c  IAVT-0001-T-0710,NSS-96982
                                          heck)
2023-01-10 04:39:33 UTC  192.168.248.133  Microsoft Windows SMB Versions Supported (remote check)                  NSS-100871
2023-01-10 04:39:33 UTC  192.168.248.133  WMI Not Available                                                        NSS-135860
2023-01-10 04:39:33 UTC  192.168.248.133  Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Regis  IAVB-0001-B-0506,NSS-26917
                                          try
2023-01-10 04:39:33 UTC  192.168.248.133  Nessus SYN scanner                                                       NSS-11219
2023-01-10 04:39:33 UTC  192.168.248.133  DCE Services Enumeration                                                 NSS-10736
2023-01-10 04:39:33 UTC  192.168.248.133  Microsoft Windows SMB Service Detection                                  NSS-11011
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
msf6 > vulns -p 3389

Vulnerabilities
===============

Timestamp                Host             Name                                                   References
---------                ----             ----                                                   ----------
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Cipher Block Chaining Cipher Suites Supported      NSS-70544
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Session Resume Supported                           NSS-51891
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Medium Strength Cipher Suites Supported (SWEET32)  CVE-2016-2183,NSS-42873
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Perfect Forward Secrecy Cipher Suites Supported    NSS-57041
2023-01-10 04:39:33 UTC  192.168.248.133  SSL/TLS Recommended Cipher Suites                      NSS-156899
2023-01-10 04:39:33 UTC  192.168.248.133  SSL RC4 Cipher Suites Supported (Bar Mitzvah)          CVE-2013-2566,CVE-2015-2808,BID-58796,BID-73684,NSS-65821
2023-01-10 04:39:33 UTC  192.168.248.133  TLS Version 1.0 Protocol Detection                     NSS-104743
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Cipher Suites Supported                            NSS-21643
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Self-Signed Certificate                            NSS-57582
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Certificate Cannot Be Trusted                      NSS-51192
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Certificate Signed Using Weak Hashing Algorithm    CVE-2004-2761,BID-11849,BID-33065,CERT-836068,CWE-310,NSS-35291
2023-01-10 04:39:33 UTC  192.168.248.133  SSL Certificate Information                            NSS-10863
2023-01-10 04:39:33 UTC  192.168.248.133  SSL / TLS Versions Supported                           NSS-56984
2023-01-10 04:39:33 UTC  192.168.248.133  Terminal Services Use SSL/TLS                          NSS-64814
2023-01-10 04:39:33 UTC  192.168.248.133  Nessus SYN scanner                                     NSS-11219
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
msf6 > search cve:2017 name:smb

Matching Modules
================

   #  Name                                      Disclosure Date  Rank     Check  Description
   -  ----                                      ---------------  ----     -----  -----------
   0  exploit/windows/smb/ms17_010_eternalblue  2017-03-14       average  Yes    MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
   1  exploit/windows/smb/ms17_010_psexec       2017-03-14       normal   Yes    MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution
   2  auxiliary/admin/smb/ms17_010_command      2017-03-14       normal   No     MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Command Execution
   3  auxiliary/scanner/smb/smb_ms17_010                         normal   No     MS17-010 SMB RCE Detection
   4  exploit/windows/smb/smb_doublepulsar_rce  2017-04-14       great    Yes    SMB DOUBLEPULSAR Remote Code Execution


Interact with a module by name or index. For example info 4, use 4 or use exploit/windows/smb/smb_doublepulsar_rce

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
msf6 > search MS17-010

Matching Modules
================

   #  Name                                      Disclosure Date  Rank     Check  Description
   -  ----                                      ---------------  ----     -----  -----------
   0  exploit/windows/smb/ms17_010_eternalblue  2017-03-14       average  Yes    MS17-010 EternalBlue SMB Remote Windows Kernel Pool Corruption
   1  exploit/windows/smb/ms17_010_psexec       2017-03-14       normal   Yes    MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code Execution
   2  auxiliary/admin/smb/ms17_010_command      2017-03-14       normal   No     MS17-010 EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Command Execution
   3  auxiliary/scanner/smb/smb_ms17_010                         normal   No     MS17-010 SMB RCE Detection
   4  exploit/windows/smb/smb_doublepulsar_rce  2017-04-14       great    Yes    SMB DOUBLEPULSAR Remote Code Execution


Interact with a module by name or index. For example info 4, use 4 or use exploit/windows/smb/smb_doublepulsar_rce
1
2
3
4
5
6
7
8
9
10
11
msf6 > search SMB DOUBLEPULSAR Remote Code Execution

Matching Modules
================

   #  Name                                      Disclosure Date  Rank   Check  Description
   -  ----                                      ---------------  ----   -----  -----------
   0  exploit/windows/smb/smb_doublepulsar_rce  2017-04-14       great  Yes    SMB DOUBLEPULSAR Remote Code Execution


Interact with a module by name or index. For example info 0, use 0 or use exploit/windows/smb/smb_doublepulsar_rce