Jump to content

superkizuna

Members
  • Posts

    3
  • Joined

  • Last visited

Everything posted by superkizuna

  1. UPDATE, So I am able to get the scanner modules working on some other hosts but I'm guessing the target is filtering. Anybody know what that ssl_version scanner module uses to scan?
  2. I setup port forwarding on 4444 UDP & TCP as well and seem to be having issues with some exploits too. What gives?
  3. ALCON, Hello, I been running metasploit scanner modules and getting no output from the scanner. The last one I used was /auxiliary/scanner/http/ssl_version. I know the target is vulnerable from an NSE scan with NMAP but when I run the scanner I get: [*] Scanned 1 of 1 hosts (100% complete) [*] Auxiliary module execution completed And that folks is it! So, I tried to run a few more on my own network and I get the same thing. Is there something that I'm not setting up or what? I am in the middle of a pentest for a client and have other frameworks getting good data but for some reason Metasploit is not playing ball.
×
×
  • Create New...