
An error has occurred the feed is probably down.SANS Institute Security Awareness Tip of the Day Then we will dive into exploiting the open services. We will take a closer look at these in the next tutorial. First click the ‘Export button In the ‘Report’ tab. Backtrack 5’s Metasploit console has several service scanners that we can use to get exact version levels. In order to use these results in Metasploit’s autopwn module, we will need to save the results in the Nessus. Nmap tries its best, but it is not always correct. If nothing comes up, you may not have the exact software version. If you strike out, no worries, we will take a closer look at this in a later tutorial. See if you can find it and give it a shot. With a little searching, you can find an Unreal exploit usable through Backtrack 5’s Metasploit program that will give you a root shell. 4-How are Nmap, Nessus, and Metasploit similar In other words, what can all three tools do Nmap scans networks using IP packets to discover what systems. Just searching “unreal3.2.8.1 exploits” in Google should do the trick. In a few minutes you will see a screen that looks like this:įor each port, we see the port number, service type and even an attempt at the service software version.įrom here, we can grab the software version, in this case “Unreal IRC 3.2.8.1”, and do a search for vulnerabilities for that software release. Nmap will churn for a while while it tries to detect the actual services running on these ports. This will show us the open ports and try to enumerate what services are running. Open a Terminal window on your Backtrack system and type:



Let’s run an nmap scan and see what services are installed. Okay, let’s take a look at Metasploitable from our Backtrack box.
