APT2 自动化渗透测试工具包









nmaploadxml Load NMap XML File

hydrasmbpassword Attempt to bruteforce SMB passwords

nullsessionrpcclient Test for NULL Session

msf_snmpenumshares Enumerate SMB Shares via LanManager OID Values

nmapbasescan Standard NMap Scan

impacketsecretsdump Test for NULL Session

msf_dumphashes Gather hashes from MSF Sessions

msf_smbuserenum Get List of Users From SMB

anonftp Test for Anonymous FTP

searchnfsshare Search files on NFS Shares

crackPasswordHashJohnTR Attempt to crack any password hashes

msf_vncnoneauth Detect VNC Services with the None authentication type

nmapsslscan NMap SSL Scan

nmapsmbsigning NMap SMB-Signing Scan

responder Run Responder and watch for hashes

msf_openx11 Attempt Login To Open X11 Service

nmapvncbrute NMap VNC Brute Scan

msf_gathersessioninfo Get Info about any new sessions

nmapsmbshares NMap SMB Share Scan

userenumrpcclient Get List of Users From SMB

httpscreenshot Get Screen Shot of Web Pages

httpserverversion Get HTTP Server Version

nullsessionsmbclient Test for NULL Session

openx11 Attempt Login To Open X11 Servicei and Get Screenshot

msf_snmplogin Attempt Login Using Common Community Strings

msf_snmpenumusers Enumerate Local User Accounts Using LanManager/psProcessUsername OID Values

httpoptions Get HTTP Options

nmapnfsshares NMap NFS Share Scan

msf_javarmi Attempt to Exploit A Java RMI Service

anonldap Test for Anonymous LDAP Searches

ssltestsslserver Determine SSL protocols and ciphers

gethostname Determine the hostname for each IP

sslsslscan Determine SSL protocols and ciphers

nmapms08067scan NMap MS08-067 Scan

msf_ms08_067 Attempt to exploit MS08-067