{"id":303,"date":"2014-07-01T01:35:04","date_gmt":"2014-07-01T01:35:04","guid":{"rendered":"http:\/\/ixyzero.com\/blog\/?p=303"},"modified":"2014-07-01T01:35:04","modified_gmt":"2014-07-01T01:35:04","slug":"wmap%e7%9a%84%e4%bd%bf%e7%94%a8","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/303.html","title":{"rendered":"wmap\u7684\u4f7f\u7528"},"content":{"rendered":"<p style=\"color: #000000;\">WMap\u662f\u4e00\u4e2a\u96c6\u6210\u4e8eMetasploit\u6846\u67b6\u4e2d\u7528\u4e8e\u6d4b\u8bd5Web\u8106\u5f31\u6027\u7684\u5de5\u5177\uff0c\u5728\u4f7f\u7528\u4e4b\u524d\uff0c\u4f60\u9700\u8981\u5148\u521b\u5efa\u4e00\u4e2a\u6570\u636e\u5e93\u8fde\u63a5\u7528\u4e8e\u5b58\u653e\u626b\u63cf\u7684\u6570\u636e\u3001\u7ed3\u679c\uff0c\u7136\u540e\u52a0\u8f7dwmap\u63d2\u4ef6\uff0c\u5f53\u4f60\u4e0d\u6e05\u695a\u547d\u4ee4\u6709\u54ea\u4e9b\u65f6\uff0c\u53ef\u4ee5\u4f7f\u7528help\u547d\u4ee4\u8fdb\u884c\u67e5\u770b\u5e2e\u52a9\u3002<\/p>\n<div style=\"color: #000000;\">msf &gt;\u00a0<span style=\"color: #13c16a;\">load wmap<\/span><\/div>\n<div style=\"color: #000000;\">.-.-.-..-.-.-..&#8212;..&#8212;.<\/div>\n<div style=\"color: #000000;\">| | | || | | || | || |-&#8216;<\/div>\n<div style=\"color: #000000;\">`&#8212;&#8211;&#8216;`-&#8216;-&#8216;-&#8216;`-^-&#8216;`-&#8216;<\/div>\n<div style=\"color: #000000;\">[WMAP 1.5.1] ===\u00a0 et [\u00a0 ] metasploit.com 2012<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>Successfully loaded plugin: wmap<\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\">msf &gt;\u00a0<span style=\"color: #13c16a;\">help<\/span><\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\">wmap Commands<\/div>\n<div style=\"color: #000000;\">=============<\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 Command\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Description<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 &#8212;&#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&#8212;&#8212;&#8211;<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 wmap_modules\u00a0 Manage wmap modules<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 wmap_nodes\u00a0\u00a0\u00a0 Manage nodes<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 wmap_run\u00a0\u00a0\u00a0\u00a0\u00a0 Test targets<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 wmap_sites\u00a0\u00a0\u00a0 Manage sites<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 wmap_targets\u00a0 Manage targets<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 wmap_vulns\u00a0\u00a0\u00a0 Display web vulns<\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\"><span style=\"color: #00ff00;\">&#8230;snip&#8230;<\/span><\/div>\n<p><br style=\"color: #000000;\" \/><span style=\"color: #000000;\">\u5728\u771f\u6b63\u8fd0\u884c\u626b\u63cf\u4e4b\u524d\uff0c\u9700\u8981\u5148\u4f7f\u7528wmap_sites\u7684-a\u9009\u9879\u6dfb\u52a0\u4e00\u4e2aURL\u8fdb\u884c\u626b\u63cf\uff0c\u6dfb\u52a0\u4e86\u4e4b\u540e\u4f60\u53ef\u4ee5\u4f7f\u7528wmap_sites -l\u547d\u4ee4\u67e5\u770b\u53ef\u7528\u7684\u76ee\u6807\u3002<\/span><\/p>\n<div style=\"color: #000000;\">msf &gt;\u00a0<span style=\"color: #13c16a;\">wmap_sites -h<\/span><\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0 Usage: wmap_targets [options]<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -h\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Display this help text<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -a [url]\u00a0 Add site (vhost,url)<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -l\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 List all available sites<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -s [id]\u00a0\u00a0 Display site structure (vhost,url|ids) (level)<\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\">msf &gt;\u00a0<span style=\"color: #13c16a;\">wmap_sites -a\u00a0<a href=\"http:\/\/172.16.194.172\/\">http:\/\/172.16.194.172<\/a><\/span><\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]\u00a0<\/span>Site created.<\/div>\n<div style=\"color: #000000;\">msf &gt;\u00a0<span style=\"color: #13c16a;\">wmap_sites -l<\/span><\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]\u00a0<\/span>Available sites<\/div>\n<div style=\"color: #000000;\">===============<\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0\u00a0 Id\u00a0 Host\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Vhost\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Port\u00a0 Proto\u00a0 # Pages\u00a0 # Forms<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0\u00a0 &#8212;\u00a0 &#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;-\u00a0 &#8212;&#8211;\u00a0 &#8212;&#8212;-\u00a0 &#8212;&#8212;-<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0\u00a0 0\u00a0\u00a0 172.16.194.172\u00a0 172.16.194.172\u00a0 80\u00a0\u00a0\u00a0 http\u00a0\u00a0 0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 0<\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\"><\/div>\n<p><span style=\"color: #000000;\">\u7136\u540e\uff0c\u5c06\u7ad9\u70b9\u6dfb\u52a0\u5230\u201c\u76ee\u6807\u201d\u4e2d\u53bb\uff0c\u4f7f\u7528wmap_targets\u547d\u4ee4\u7684-t\u9009\u9879\uff1b<\/span><\/p>\n<div style=\"color: #000000;\">msf &gt;\u00a0<span style=\"color: #13c16a;\">wmap_targets -h<\/span><\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>Usage: wmap_targets [options]<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -h\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Display this help text<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -t [urls]\u00a0\u00a0\u00a0\u00a0<span style=\"color: #ff0000;\"><strong>Define target sites (vhost1,url[space]vhost2,url)<\/strong><\/span><\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -d [ids]\u00a0\u00a0\u00a0 Define target sites (id1, id2, id3 &#8230;)<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -c\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Clean target sites list<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -l\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 List all target sites<\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\">msf &gt;\u00a0<span style=\"color: #13c16a;\">wmap_targets -t http:\/\/172.16.194.172\/mutillidae\/index.php<\/span><\/div>\n<p><br style=\"color: #000000;\" \/><span style=\"color: #000000;\">Once added, we can view our list of targets by using the &#8216;-l&#8217; switch from the console.\u00a0<\/span><br style=\"color: #000000;\" \/><br style=\"color: #000000;\" \/><\/p>\n<div style=\"color: #000000;\">\n<div>msf &gt; wmap_targets -l<\/div>\n<div>[*] Defined targets<\/div>\n<div>===============<\/div>\n<div><\/div>\n<div>\u00a0\u00a0\u00a0\u00a0 Id\u00a0 Vhost\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Host\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Port\u00a0 SSL\u00a0\u00a0\u00a0 Path<\/div>\n<div>\u00a0\u00a0\u00a0\u00a0 &#8212;\u00a0 &#8212;&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;-\u00a0 &#8212;\u00a0\u00a0\u00a0 &#8212;-<\/div>\n<div>\u00a0\u00a0\u00a0\u00a0 0\u00a0\u00a0 172.16.194.172\u00a0 172.16.194.172\u00a0 80\u00a0\u00a0\u00a0 false\u00a0\u00a0\u00a0 \/mutillidae\/index.php<\/div>\n<div><\/div>\n<\/div>\n<p><br style=\"color: #000000;\" \/><span style=\"color: #000000;\">Using the\u00a0<\/span><b style=\"color: #000000;\">&#8220;wmap_run&#8221;<\/b><span style=\"color: #000000;\">\u00a0command will scan the target system.\u00a0<\/span><br style=\"color: #000000;\" \/><br style=\"color: #000000;\" \/><\/p>\n<div style=\"color: #000000;\">msf &gt;\u00a0<span style=\"color: #13c16a;\">wmap_run -h<\/span><\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>Usage: wmap_run [options]<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -h\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Display this help text<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -t\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Show all enabled modules<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -m [regex]\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Launch only modules that name match provided regex.<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -p [regex]\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Only test path defined by regex.<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0 -e [\/path\/to\/profile]\u00a0\u00a0\u00a0\u00a0 Launch profile modules against all matched targets.<\/div>\n<div style=\"color: #000000;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 (No profile file runs all enabled modules.)<\/div>\n<div style=\"color: #000000;\"><\/div>\n<p><br style=\"color: #000000;\" \/><span style=\"color: #000000;\">We first using the\u00a0<\/span><b style=\"color: #000000;\">&#8220;-t&#8221;<\/b><span style=\"color: #000000;\">\u00a0switch to list the modules that will be used to scan the remote system.\u00a0\uff08\u4f7f\u7528 wmap_run -l \u547d\u4ee4\u53ef\u4ee5\u5217\u51fa\u6211\u4eec\u5c06\u8981\u4f7f\u7528\u7684\u626b\u63cf\u6a21\u5757\uff01\uff09<\/span><br style=\"color: #000000;\" \/><br style=\"color: #000000;\" \/><\/p>\n<div style=\"color: #000000;\">msf &gt;\u00a0<span style=\"color: #13c16a;\">wmap_run -t<\/span><\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Testing target:<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0\u00a0\u00a0\u00a0 Site: 192.168.1.100 (192.168.1.100)<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0\u00a0\u00a0\u00a0 Port: 80 SSL: false<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0============================================================<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Testing started. 2012-01-16 15:46:42 -0500<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]\u00a0<\/span>=[ SSL testing ]=<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0============================================================<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Target is not SSL. SSL modules disabled.<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]\u00a0<\/span>=[ Web Server testing ]=<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0============================================================<span style=\"color: #0000ff;\">[*]<\/span>\u00a0Loaded auxiliary\/admin\/http\/contentkeeper_fileaccess &#8230;<span style=\"color: #0000ff;\">[*]<\/span>\u00a0Loaded auxiliary\/admin\/http\/tomcat_administration &#8230;<span style=\"color: #0000ff;\">[*]<\/span>Loaded auxiliary\/admin\/http\/tomcat_utf8_traversal &#8230;<span style=\"color: #0000ff;\">[*]<\/span>\u00a0Loaded auxiliary\/admin\/http\/trendmicro_dlp_traversal &#8230;<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #00ff00;\">..snip&#8230;<\/span><\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\">msf &gt;<\/div>\n<p><br style=\"color: #000000;\" \/><span style=\"color: #000000;\">All that remains now is to actually run the scan against our target URL.\u00a0<\/span><br style=\"color: #000000;\" \/><br style=\"color: #000000;\" \/><\/p>\n<div style=\"color: #000000;\">msf &gt;\u00a0<span style=\"color: #13c16a;\">wmap_run -e<\/span><\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Using ALL wmap enabled modules.<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #ff0000;\">[-]<\/span>\u00a0NO WMAP NODES DEFINED. Executing local modules<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Testing target:<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0\u00a0\u00a0\u00a0 Site: 172.16.194.172 (172.16.194.172)<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]\u00a0<\/span>\u00a0\u00a0\u00a0 Port: 80 SSL: false<\/div>\n<div style=\"color: #000000;\">============================================================<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Testing started. 2012-06-27 09:29:13 -0400<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]\u00a0<\/span>=[ SSL testing ]=<\/div>\n<div style=\"color: #000000;\">============================================================<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Target is not SSL. SSL modules disabled.<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]\u00a0<\/span>=[ Web Server testing ]=<\/div>\n<div style=\"color: #000000;\">============================================================<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]\u00a0<\/span>Module auxiliary\/scanner\/http\/http_version<\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0172.16.194.172:80 Apache\/2.2.8 (Ubuntu) DAV\/2 ( Powered by PHP\/5.2.4-2ubuntu5.10 )<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Module auxiliary\/scanner\/http\/open_proxy<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]\u00a0<\/span>Module auxiliary\/scanner\/http\/robots_txt<\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\"><span style=\"color: #00ff00;\">..snip&#8230;<\/span><span style=\"color: #00ff00;\">..snip&#8230;<\/span><span style=\"color: #00ff00;\">..snip&#8230;<\/span><\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Module auxiliary\/scanner\/http\/soap_xml<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Path: \/<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Server 172.16.194.172:80 returned HTTP 404 for \/.\u00a0 Use a different one.<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Module auxiliary\/scanner\/http\/trace_axd<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Path: \/<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Module auxiliary\/scanner\/http\/verb_auth_bypass<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span><\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\">=[ Unique Query testing ]=<\/div>\n<div style=\"color: #000000;\">============================================================<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Module auxiliary\/scanner\/http\/blind_sql_query<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Module auxiliary\/scanner\/http\/error_sql_injection<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Module auxiliary\/scanner\/http\/http_traversal<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Module auxiliary\/scanner\/http\/rails_mass_assignment<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>\u00a0Module exploit\/multi\/http\/lcms_php_exec<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span><\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\">=[ Query testing ]=<\/div>\n<div style=\"color: #000000;\">============================================================<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span><\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: #000000;\">=[ General testing ]=<\/div>\n<div style=\"color: #000000;\">============================================================<\/div>\n<div style=\"color: #000000;\">++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++<\/div>\n<div style=\"color: #000000;\">Launch completed in 212.01512002944946 seconds.<\/div>\n<div style=\"color: #000000;\">++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++<\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span><\/div>\n<div style=\"color: #000000;\">Done.<\/div>\n<div style=\"color: #000000;\"><\/div>\n<p><br style=\"color: #000000;\" \/><span style=\"color: #000000;\">\u5728\u626b\u63cf\u6267\u884c\u5b8c\u4e86\u4e4b\u540e\uff0c\u6211\u4eec\u53ef\u4ee5\u67e5\u770b\u4e00\u4e0b\u6570\u636e\u5e93\u4e2d\u662f\u5426\u5b58\u5728\u4e00\u4e9b\u53ef\u7528\u7684\u4e1c\u897f&#8212;\u6f0f\u6d1e\uff01<\/span><\/p>\n<div style=\"color: #000000;\">\n<div>msf &gt;\u00a0<span style=\"color: #ff0000;\"><strong>wmap_vulns -l<\/strong><\/span><\/div>\n<div>[*] + [172.16.194.172] (172.16.194.172): scraper \/<\/div>\n<div>[*]\u00a0\u00a0\u00a0\u00a0 scraper Scraper<\/div>\n<div>[*]\u00a0\u00a0\u00a0\u00a0 GET Metasploitable2 &#8211; Linux<\/div>\n<div>[*] + [172.16.194.172] (172.16.194.172): directory \/dav\/<\/div>\n<div>[*]\u00a0\u00a0\u00a0\u00a0 directory Directory found.<\/div>\n<div>[*]\u00a0\u00a0\u00a0\u00a0 GET Res code: 200<\/div>\n<div>[*] + [172.16.194.172] (172.16.194.172): directory \/cgi-bin\/<\/div>\n<div>[*]\u00a0\u00a0\u00a0\u00a0 directory Directoy found.<\/div>\n<div>[*]\u00a0\u00a0\u00a0\u00a0 GET Res code: 403<\/div>\n<div><\/div>\n<p><span style=\"color: #00ff00;\">&#8230;snip&#8230;<\/span><\/p>\n<div><\/div>\n<div>msf &gt;<\/div>\n<\/div>\n<p><br style=\"color: #000000;\" \/><span style=\"color: #000000;\">\u53ef\u4ee5\u4f7f\u7528 vulns \u547d\u4ee4\u53ef\u4ee5\u67e5\u770b\u66f4\u8be6\u7ec6\u7684\u4fe1\u606f\uff01<\/span><br style=\"color: #000000;\" \/><br style=\"color: #000000;\" \/><\/p>\n<div style=\"color: #000000;\">msf &gt;\u00a0<span style=\"color: #13c16a;\">vulns<\/span><\/div>\n<div style=\"color: #000000;\"><span style=\"color: #0000ff;\">[*]<\/span>Time: 2012-01-16 20:58:49 UTC Vuln: host=172.16.2.207 port=80 proto=tcp name=auxiliary\/scanner\/http\/options refs=CVE-2005-3398,CVE-2005-3498,OSVDB-877,BID-11604,BID-9506,BID-9561<\/div>\n<div style=\"color: #000000;\"><\/div>\n<div style=\"color: gray;\"><small><span style=\"color: #000000;\">We can now use this information to gather further information on the reported vulnerability. As pentesters, we would want to investigate each finding further and identify if there are potential methods for attack.<\/span><\/small><\/div>\n<div style=\"color: gray;\"><small>\u6765\u6e90\uff1a\u00a0&lt;<a href=\"http:\/\/www.offensive-security.com\/metasploit-unleashed\/WMAP_Web_Scanner\">http:\/\/www.offensive-security.com\/metasploit-unleashed\/WMAP_Web_Scanner<\/a><small>&gt;<\/small><\/small><\/div>\n<div style=\"color: gray;\">\n<hr \/>\n<\/div>\n<div style=\"color: gray;\"><small><small><\/small><\/small><small><span style=\"color: #ff0000; font-size: medium;\"><strong>\u603b\u7ed3\u4e00\u4e0b\u4f7f\u7528wmap\u7684\u5177\u4f53\u6b65\u9aa4\uff1a<\/strong><\/span><\/small><\/div>\n<p style=\"color: gray;\">\n<ul>\n<li><small><small><span style=\"color: #ff0000; font-size: medium;\">\u8fdb\u5165Metasploit\uff08\u5728\u8fd9\u4e4b\u524d\u6700\u597d\u5148\u8fd0\u884c\uff1aservice postgresql start &amp;&amp; service metasploit start \u547d\u4ee4\u5f00\u542f\u8fd9\u4e24\u4e2a\u57fa\u7840\u670d\u52a1\uff09\uff1b<\/span><\/small><\/small><\/li>\n<li><small><small><span style=\"color: #ff0000; font-size: medium;\">\u7136\u540e\u8fde\u63a5\u6570\u636e\u5e93\uff08db_connect\uff09{\u5176\u5b9e\u5e94\u8be5\u662f\u9ed8\u8ba4\u8fde\u63a5\u7684\uff0c\u4f46\u662f\u4f30\u8ba1\u662f\u56e0\u4e3a\u6211\u4e4b\u524d\u6ca1\u6709\u6ce8\u610f\uff0c\u5728\u54ea\u4e2a\u5730\u65b9\u7ffb\u4e86\u4e2a\u9519\u8bef\uff0c\u5bfc\u81f4\u540e\u6765\u90fd\u5f97\u624b\u52a8\u8fde\u63a5}\uff1b<\/span><\/small><\/small><\/li>\n<li><small><small><span style=\"color: #ff0000; font-size: medium;\">\u4e4b\u540e\u52a0\u8f7dwmap\u63d2\u4ef6\uff08load wmap\uff09\uff1b<\/span><\/small><\/small><\/li>\n<li><small><small><span style=\"color: #ff0000; font-size: medium;\">\u6dfb\u52a0\u7ad9\u70b9\uff1awmap_sites -a URL<\/span><\/small><\/small><\/li>\n<li><small><small><span style=\"color: #ff0000; font-size: medium;\">\u5217\u4e3a\u76ee\u6807\uff1awmap_targets -t URL<\/span><\/small><\/small><\/li>\n<li><small><small><span style=\"color: #ff0000; font-size: medium;\">\u5148\u662f\u5c06\u8981\u6267\u884c\u7684\u626b\u63cf\u6a21\u5757\uff1awmap_run -t<\/span><\/small><\/small><\/li>\n<li><small><small><span style=\"color: #ff0000; font-size: medium;\">\u6267\u884c\u626b\u63cf\uff1awmap_run -e<\/span><\/small><\/small><\/li>\n<li><small><span style=\"color: rgb(255, 0, 0);\">\u5728\u626b\u63cf\u5b8c\u6210\u4e4b\u540e\u663e\u793a\u662f\u5426\u5b58\u5728\u53ef\u5229\u7528\u6f0f\u6d1e\uff1awmap_vulns -l\uff08\u82e5\u8981\u67e5\u770b\u66f4\u8be6\u7ec6\u7684\u4fe1\u606f\uff0c\u5219\u4f7f\u7528vulns\u547d\u4ee4\uff09<\/span><\/small><\/li>\n<\/ul>\n<hr style=\"color: rgb(0, 0, 0);\" \/>\n<div style=\"color: rgb(0, 0, 0);\"><span>msf &gt; load wmap<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>.-.-.-..-.-.-..&#8212;..&#8212;.<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>| | | || | | || | || |-&#8216;<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>`&#8212;&#8211;&#8216;`-&#8216;-&#8216;-&#8216;`-^-&#8216;`-&#8216;<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>[WMAP 1.5.1] ===\u00a0 et [\u00a0 ] metasploit.com 2012<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>[*] Successfully loaded plugin: wmap<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>msf &gt; help<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>wmap Commands<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>=============<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 Command\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Description<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 &#8212;&#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&#8212;&#8212;&#8211;<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 wmap_modules\u00a0 Manage wmap modules<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 wmap_nodes\u00a0\u00a0\u00a0 Manage nodes<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 wmap_run\u00a0\u00a0\u00a0\u00a0\u00a0 Test targets<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 wmap_sites\u00a0\u00a0\u00a0 Manage sites<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 wmap_targets\u00a0 Manage targets<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 wmap_vulns\u00a0\u00a0\u00a0 Display web vulns<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>Core Commands<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>=============<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 Command\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Description<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 &#8212;&#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&#8212;&#8212;&#8211;<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 ?\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Help menu<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 back\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Move back from the current context<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 banner\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Display an awesome metasploit banner<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 cd\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Change the current working directory<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 color\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Toggle color<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 connect\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Communicate with a host<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 exit\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exit the console<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 go_pro\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Launch Metasploit web GUI<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 grep\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Grep the output of another command<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 help\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Help menu<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 info\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Displays information about one or more module<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 irb\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Drop into irb scripting mode<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 jobs\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Displays and manages jobs<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 kill\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Kill a job<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 load\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Load a framework plugin<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 loadpath\u00a0\u00a0\u00a0\u00a0\u00a0 Searches for and loads modules from a path<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 makerc\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Save commands entered since start to a file<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 popm\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Pops the latest module off the stack and makes it active<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 previous\u00a0\u00a0\u00a0\u00a0\u00a0 Sets the previously loaded module as the current module<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 pushm\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Pushes the active or list of modules onto the module stack<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 quit\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Exit the console<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 reload_all\u00a0\u00a0\u00a0 Reloads all modules from all defined module paths<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 resource\u00a0\u00a0\u00a0\u00a0\u00a0 Run the commands stored in a file<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 route\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Route traffic through a session<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 save\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Saves the active datastores<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 search\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Searches module names and descriptions<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 sessions\u00a0\u00a0\u00a0\u00a0\u00a0 Dump session listings and display information about sessions<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 set\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Sets a variable to a value<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 setg\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Sets a global variable to a value<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 show\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Displays modules of a given type, or all modules<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 sleep\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Do nothing for the specified number of seconds<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 spool\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Write console output into a file as well the screen<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 threads\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 View and manipulate background threads<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 unload\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Unload a framework plugin<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 unset\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Unsets one or more variables<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 unsetg\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Unsets one or more global variables<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 use\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Selects a module by name<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 version\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Show the framework and console library version numbers<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>Database Backend Commands<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>=========================<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 Command\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Description<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 &#8212;&#8212;-\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&#8212;&#8212;&#8211;<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 creds\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 List all credentials in the database<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 db_connect\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Connect to an existing database<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 db_disconnect\u00a0\u00a0\u00a0\u00a0 Disconnect from the current database instance<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 db_export\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Export a file containing the contents of the database<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 db_import\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Import a scan result file (filetype will be auto-detected)<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 db_nmap\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Executes nmap and records the output automatically<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 db_rebuild_cache\u00a0 Rebuilds the database-stored module cache<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 db_status\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Show the current database status<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 hosts\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 List all hosts in the database<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 loot\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 List all loot in the database<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 notes\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 List all notes in the database<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 services\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 List all services in the database<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 vulns\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 List all vulnerabilities in the database<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0\u00a0 workspace\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Switch between database workspaces<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>msf &gt; wmap_<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span><span style=\"color: #ff0000;\"><strong>wmap_modules\u00a0 wmap_nodes\u00a0\u00a0\u00a0 wmap_run\u00a0\u00a0\u00a0\u00a0\u00a0 wmap_sites\u00a0\u00a0\u00a0 wmap_targets\u00a0 wmap_vulns<\/strong><\/span>\u00a0\u00a0\u00a0<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>msf &gt; wmap_sites -a http:\/\/www.dvssc.com\/<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>[-] Unable to create site<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>msf &gt; wmap_sites -a 10.10.10.129<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>[-] Unable to create site<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>msf &gt; wmap_sites -a http:\/\/10.10.10.129<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>[-] Unable to create site<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>msf &gt; wmap_sites -a http:\/\/210.21.21.21<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>[-] Unable to create site<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>msf &gt; wmap_sites -a http:\/\/210.21.21.21\/<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>[-] Unable to create site<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>msf &gt; wmap_sites -h<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>[*] Usage: wmap_sites [options]<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0 \u00a0-h\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Display this help text<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0 \u00a0-a [url]\u00a0 Add site (vhost,url)<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0 \u00a0-d [ids]\u00a0 Delete sites (separate ids with space)<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0 \u00a0-l\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 List all available sites<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0 \u00a0-s [id]\u00a0\u00a0 Display site structure (vhost,url|ids) (level)<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u6240\u4ee5\uff0c\u603b\u7684\u6765\u8bf4wmap\u7684\u5229\u7528\u6d41\u7a0b\u5c31\u662f\uff1a<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span>\u00a0\u00a0<\/span><span style=\"color: #ff0000;\">wmap_sites -a http:\/\/192.168.10.11<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span style=\"color: #ff0000;\">\u00a0 wmap_sites -l<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span style=\"color: #ff0000;\">\u00a0 wmap_targets -t\u00a0<\/span><a href=\"http:\/\/192.168.10.11\/mutillidae\/index.php\"><span style=\"color: #ff0000;\">http:\/\/192.168.10.11\/mutillidae\/index.php<\/span><\/a><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span style=\"color: #ff0000;\">\u00a0 wmap_targets -t<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span style=\"color: #ff0000;\">\u00a0 wmap_run -t<\/span><\/div>\n<div style=\"color: rgb(0, 0, 0);\"><span style=\"color: #ff0000;\">\u00a0 wmap_run -e<\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>WMap\u662f\u4e00\u4e2a\u96c6\u6210\u4e8eMetasploit\u6846\u67b6\u4e2d\u7528\u4e8e\u6d4b\u8bd5Web\u8106\u5f31\u6027\u7684\u5de5\u5177\uff0c\u5728\u4f7f\u7528\u4e4b\u524d\uff0c\u4f60\u9700\u8981\u5148\u521b\u5efa\u4e00\u4e2a\u6570\u636e\u5e93\u8fde [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,25,12],"tags":[70,144],"class_list":["post-303","post","type-post","status-publish","format-standard","hentry","category-linux","category-security","category-tools","tag-metasploit","tag-wmap"],"views":2312,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=303"}],"version-history":[{"count":0,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/303\/revisions"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}