Description: In this video I will show you how to use this four modules.
http://www.metasploit.com/modules/auxiliary/scanner/http/vhost_scanner
http://www.metasploit.com/modules/auxiliary/scanner/http/dir_scanner
http://www.metasploit.com/modules/auxiliary/scanner/http/enum_wayback
http://www.metasploit.com/modules/auxiliary/scanner/http/impersonate_ssl
1 ) auxiliary/scanner/http/vhost_scanner
This module tries to identify unique virtual hosts hosted by the target web server.
2 ) auxiliary/scanner/http/dir_scanner
This module identifies the existence of interesting directories in a given directory path.
3 ) auxiliary/scanner/http/enum_wayback
This module pulls and parses the URLs stored by Archive.org for the purpose of replaying during a web assessment. Finding unlinked and old pages.
4 ) auxiliary/scanner/http/impersonate_ssl
This module request a copy of the remote SSL certificate and creates a local (self.signed) version using the information from the remote version. The module then Outputs (PEM|DER) format private key / certificate and a combined version for use in Apache or other Metasploit modules requiring SSLCert Inputs for private key / CA cert have been provided for those with diginator certs hanging about!
Source : - http://www.metasploit.com
Tags: metasploit , framework , hacking , hack , auxiliary ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.