
上QQ阅读APP看书,第一时间看更新
Open proxy detection
This is a very simple script. It allows us to check whether a proxy service we found on a port is an open proxy. If a proxy service is an open proxy, we can use the server as a proxy to perform different attacks and to avoid detection, especially during a red team activity. Implement the following steps to see how this is done:
- Start by searching for the open_proxy keyword in the Modules tab, as shown in the following screenshot:
- Clicking on the module name, we will be redirected to the options where we set the IP, the port, and the URL to check the proxy settings.
- Clicking on Run Module will create a new task:
If the proxy is open, we will see a message in the task window, as shown in the following screenshot:
Now that we have a better understanding of performing active reconnaissance using Metasploit, let's move on to the next topic to learn about passive reconnaissance.