• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
    • Hardware Bundles
    • Wireless Adapters
    • Pentesting Tools
    • Security
    • Accessories
    • Clothing
    • Books
    • All
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
      • Hardware Bundles
      • Wireless Adapters
      • Pentesting Tools
      • Security
      • Accessories
      • Clothing
      • Books
      • All
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

      Hacking & Security

      How To Use Metasploit Auxiliaries

      • Posted by Gagandeep Singh
      • Date September 2, 2019

      As we all know Metasploit is a huge framework and can be used to do a lot of tasks. In this article we will see how to use Metasploit’s auxiliary modules. These modules are very helpful in so many scenarios such as scanning, information gathering and much more, in this tutorial I will show you how to use a port scanner but you can follow the same steps to use most auxiliary modules.

      So. let’s get started 

      1. First start the Metasploit framework by just running the command msfconsole on terminal.

       

      2. Now to see all the auxiliary modules available in Metasploit just type command:

      show auxiliary

      As you see there are a lot of modules, you can see we also have a description of each so just use as per your requirement.

       

      3. I am going to use an auxiliary that does a tcp port scan, so I’m going to use the “use” command followed by the auxiliary that I want to use:

      use auxiliary/scanner/portscan/tcp 

      Just like using anything in the Metasploiot framework, if you’re stuck at any point just hit double tab to see all the available modules as shown below

       

      We can also use the “info” command to get more information on a specific module (or auxiliary in this case) and see all the options that we can set:

       

      4. Now we need to change the options so the module runs on our target, I am going to run this module against another virtual machine in my network, this virtual machine is running metasploitable so it should have a number of open ports, so the main option that I need to set is the RHOST which is the IP of the machine that I want to run this module against, changing the options here is the same as changing it in any other Metasploit module, it follows the following format

      set [option name] [option value]

      So in my case [option name] is RHOST and [option value] is 10.0.2.9 which is the IP of the target machine, therefore the command is:

      set RHOST 10.0.2.9
      

      I’ll also change the number of threads by running

      set THREADS 50 

       

      5. And finally we can run “info” again just to make sure that all the options are set as we wish and then use the “run” command to run the module, give it sometime and you’ll get the results in the same window.

       

      So this is just a simple example of using an auxiliary in Metasploit, in here we used a port scanner but you can use most modules the same way, so the main steps are:

      1. List all auxiliaries:

      show auxiliary

       

      2. Select an auxiliary.

      use [auxiliary name]

       

      3. Get more info about it

      info

       

      4. Set options.

      set [option name] [option value]

       

      5. Confirm changes.

      info

       

      6. Run the module.

      run
      • Share:
      author avatar
      Gagandeep Singh

      An ethical hacker and learner.

      Previous post

      How To Become a Hacker
      September 2, 2019

      Next post

      Quantum Computing & Cryptography: Moving From Binary to Superposition.
      September 5, 2019

      You may also like

      domain-controllers_370x208
      Identifying Domain controller in a network
      24 March, 2023
      storm-braker_370x208
      Access Location, Camera & Mic of any Device 🌎🎤📍📷
      23 March, 2023
      Common-Authentication-Bypass-Techniques_370x208
      Common Authentication Bypass Techniques
      16 March, 2023

        2 Comments

      1. gurparmvir
        September 4, 2019
        Log in to Reply

        Thank You bhaji. I was looking for something like this . I am trying to learn Metasploit using payloads and stuff like this . .

        • Gagandeep Singh
          September 13, 2019
          Log in to Reply

          Thanks veere

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • Hardware
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Privacy
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Download Custom Kali
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright © 2022 Z IT SECURITY LTD t/a zSecurity. All rights reserved.

      • Privacy
      • Shipping
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Enroll in this course to access this lesson!

      All of our courses include:

      ✔ Lifetime, unlimited access to course materials & training videos.

      ✔ Watch online or download lectures for offline use.

      ✔ Verifiable certificate of completion from zSecurity, signed by the course instructor, Zaid.

      ✔ Get answers from our Support Team within a maximum of 15 hours.

      ✔ Unlimited Updates.

      Get free 1 month VIP membership per course with:

      ✔ Live mentorship and Q&A session with the course instructor, Zaid.

      ✔ Instant support from community members through our private discord channel.

      ✔ Daily updates with the latest tutorials & news in the hacking world.

      ✔ Daily resources like CTFs, bug bounty programs, onion services and more!

      ✔ Access our VIP community & connect with like-minded people.

      ✔ Discounts on other zSecurity products and services.

      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance