Nmap done: 256 IP addresses (16 hosts up) scanned in 499.41 seconds The example below would then be db_nmap -v -sV 192.168.1.0/24. If we wished for our scan to be saved to our database, we would omit the output flag and use db_nmap. Run Nmap with the options you would normally use from the command line. So we can run the Nmap scan using the -oA flag followed by the desired filename to generate the three output files, then issue the db_import command to populate the Metasploit database. It is always nice to have all three Nmap outputs (xml, grepable, and normal). However, if you also wish to import the scan results into another application or framework later on, you will likely want to export the scan results in XML format. We can use the db_nmap command to run Nmap against our targets and our scan results would than be stored automatically in our database. Security Operations for Beginners (SOC-100).Exploit Development Prerequisites (EXP-100).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |