We’ve performed advanced enumeration on our target, now let’s connect Nmap with Metasploit. We can then verify that the import worked by using the “hosts” command, which lists the systems entries that have been created, as shown here: #nmap -Pn -sS -A -oX Target 192.168.20.0/24Īfter generating the XML file, we use the db_import command to import it into our database. When you are working with other team members, with various individuals scanning at different times and from different locations, it helps to know how to import a basic nmap generated XML export file into the Framework.įirst, we scan the Windows virtual machine using the -oX option to generate a Target.xml file. now, we’ll use db_status to make sure that we’re connected correctly.Each system or running service that we discover gives us another opportunity for exploitation.īut beware If you get careless while active information gathering, you might be nabbed by an IDS or intrusion prevention system (IPS). We might conduct port scans for open ports on the target or conduct scans to determine what services are running. In active information gathering, we interact directly with a system to learn more about it. For example, you can identify network boundaries, operating systems, open ports, and web server software in use on the target without touching their system. Using passive information gathering, you can discover information about targets without touching their systems. There are two types of information gathering: passive and active. At this step, you will attempt to collect as much information about the target environment as possible. Information gathering requires careful planning, research, and most importantly, the ability to think like an attacker.