msfenum: A Metasploit auto auxiliary script

msfenum

Metasploit auto auxiliary script (msfenum)

Msfenum simplifies running multiple auxiliary modules on a specific set of targets. Running a low hanging fruit scan within a penetration test can be very useful, for example, to find open shares or vulnerable services quickly.

The Metasploit framework offers lots of useful auxiliary modules to perform low hanging fruit scans. This script simply runs all the auxiliary modules specified in the config files against the specified targets. All settings can be modified per auxiliary module and new modules can be added easily.

Structure:

  • logs/
    • Contains all results after running the script
  • modules/
    • Contains all configuration per auxiliary module
  • config
    • Contains global configuration settings
  • msfenum.log
    • Some logging generated when running msfenum.py
  • msfenum.py
    • The main script

Download

git clone https://github.com/wez3/msfenum.git

Usage

Modify the “config” file. Change the CHANGEME values in the “settings” key, otherwise, those modules will not run.

python msfenum.py [-h] [-t [THREADS]] [-p [PROJECT]] TARGET_FILE

-t [THREADS], Number of threads

-p [PROJECT], Project name

Result example

All raw results generated by Metasploit are stored within separate files in the “logs/” directory. If you specified a project name, this name is used as a folder name. Otherwise, the current Unix timestamp is used. After running the script, a summary is printed to get an overview of successful findings:

 

Copyright (C) 2018 wez3

Source: https://github.com/wez3/