Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects

Write at HWS !!!

Guest Posting

Friday, August 3, 2012

Attack An IP With Metasploit & NMAP

Hello guys, howz you all ? Vandan here. First of all I want to say thanks to XEO Hacker for giving me chance to write for this blog and I will try my best to give you guys the best I can. I have chosen "GOOGLE WORM" as my nick in hacking world hope you guys like it as well.Lets come to the tutorial. Tomorrow I have posted about ClickJacking Attack in which I have given an idea about ClickJacking and the ways how to do it. Today I am going to write about Nmap with Metasploit. Let's start .

Steps to Follow

  • First download Metasploit 3.3 from the official website.
  • Let it install and towards the end of the installation it will ask if you would like Nmap installed also, choose YES. 
  • Once you have installed the Metasploit, the below screen will open up.

  • Now type db_create. 
  • Once you have typed that type nmap, it will load nmap as shown in below image.
  • You need to configure your scan now, I usually do a simple -sT -sV scan which will tell us the open ports and services running on the victims computer. 
  • Now type nmap -sT -sV (X's being victims Ip number)
  • Now give it 5 minutes to complete the scan,Once that is complete if you are lucky you should get a response like this...
  • This is basically a list of the open ports and services running on the target machine. 
  • Now the handy feature of the metasploit 3.3 framework is the autopwn feature, this basically searches and runs all matching exploits in the Metasploit database against the target machine and if successful will create a shell or similar privilege for the attacker.
  • Now once you have the nmap results delivered back to you showing the open ports and services type db_autopwn -p -t -e.
  • From this point you will either have access to the victims computer through a successfully launched exploit or you will get a response saying the machine wasn't vulnerable to any of the exploits in the Metasploit database. 
  • Unfortunately on this particular machine I found it wasn't vulnerable as the image below proves.But if you are in luck and the targeted computer is vulnerable to exploits then BOOM.
  • Good luck. Have fun !!!
Note : This tutorial is just for educational purposes and HWS team is not responsible for any kind of misusse. Use it on your own risk. This tutorial is written by " Google Worm ".

About the Author

I am XEO Hacker, the founder of Hack With Style (HWS). I am blogging since 2009 before that I just search things and now I am sharing my knowledge through this plateform.I'm also a freelance writer on topics related to Website Hacking,Website Optimization (SEO), blogger customizations and making money online.
In 61 people's circles

Subscribe To Get FREE Tutorials!

Respected Readers:
As a 21 year old student, the only income I rely on is my pocket money. Bearing the running costs of HWS Blog has become really difficult. We educate thousands of bloggers a week with our tutorials. To help us go forward with the same spirit, a small contribution from your side will highly be appreciated.


@vandan I got it but the end is a little awkward what happens if his computer is not vulnerable pls upload the image which shows this thing man

Good job! I have found many articles to read but you do a good thing. That is a boy. Thank you so much for sharing the delicious post. Expect your next article.

It says that autopwn deprecated!!! What to do :(

"The db_autopwn command is DEPRECATED
See instead"

I hate cheaters, my fiancee never gave me a reason to be suspicious until i found her and her colleague at a romantic restaurant. she told me it was work stuff but something wasn't right. i was worried until i was introduced to cyberhacktivist1 (at) gmail (dot) com who hacked her phone and text so i can find out the made it possible to track her movement and location. he hacked her facebook, aol email. now lets say i have no doubt her was cheating. Email him he can help.

If you want your ex-girlfriend or ex-boyfriend to come crawling back to you on their knees (no matter why you broke up) you have to watch this video
right away...

(VIDEO) Get your ex back with TEXT messages?

Nice post,Everyone , I just thought I'd let you know you can have a talented hacker get your jobs done for you , whatever you need done , reach him on , let him know Maria told you

- See All Photos Captured.

- Hack facebook messages, viber chats, yahoo messenger.

- Track Line messages and BBM messages.

- Spy SMS text messages remotely.

- Track Call history and Spy Call Recording.

- Read phone contact and Track Internet Browsing History.

- 100% Undetectable and Free Update.

- Track whatsapp messages without rooting.

- Track mobile phone GPS location.

Confused? Feel free to ask

Your feedback is always appreciated. I will try to reply to your queries as soon as time allows.
Please do not spam Spam comments will be deleted immediately upon my review.

XEO Hacker

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More


Recent Posts

Join Me On Facebook

700+ Followers


meet women in Ukraine contatore visite website counter

Recent Comments

Follow Me On Twitter

1112+ Followers