superkizuna Posted February 22, 2019 Share Posted February 22, 2019 ALCON, Hello, I been running metasploit scanner modules and getting no output from the scanner. The last one I used was /auxiliary/scanner/http/ssl_version. I know the target is vulnerable from an NSE scan with NMAP but when I run the scanner I get: [*] Scanned 1 of 1 hosts (100% complete) [*] Auxiliary module execution completed And that folks is it! So, I tried to run a few more on my own network and I get the same thing. Is there something that I'm not setting up or what? I am in the middle of a pentest for a client and have other frameworks getting good data but for some reason Metasploit is not playing ball. Quote Link to comment Share on other sites More sharing options...
superkizuna Posted February 22, 2019 Author Share Posted February 22, 2019 I setup port forwarding on 4444 UDP & TCP as well and seem to be having issues with some exploits too. What gives? Quote Link to comment Share on other sites More sharing options...
superkizuna Posted February 22, 2019 Author Share Posted February 22, 2019 UPDATE, So I am able to get the scanner modules working on some other hosts but I'm guessing the target is filtering. Anybody know what that ssl_version scanner module uses to scan? Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.