My scanning methodology

Pentest Preparation Steps

1. Initialize Metasploit

  • Start the Metasploit database: Ensure the database is running.

  • Check database status: Use the command db_status to verify connectivity.

2. Prepare Target and Exclusion Lists

  • Create a Target File: List all targeted IPs in a file (e.g., target.txt).

  • Create an Exclusion File: Specify any IPs to exclude in a separate file (e.g., exclude.txt).

3. Conduct Network Scans

  • Scan for Live Hosts:

    db_nmap -sP -iL target.txt --excludefile exclude.txt
  • Service Detection and Script Scanning:

    db_nmap -sS -sV -sC -T4 -iL target2.txt
  • Use Additional Vulnerability Scripts:

    db_nmap -Pn -sS -sV -sC -T4 -A --script=vuln* -iL target2.txt

4. Identify and Document Live Hosts

  • Create a Documentation File: Record the live hosts identified during the scan in a separate file (e.g., live_hosts.txt).

Last updated