Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/scanner/finger/finger_users.md
Views: 11784
Vulnerable Application
Finger is an older protocol which displays information about users on a machine. This can be abused to verify if a user is valid on that machine. The protocol itself was designed in the 1970s, and is run in cleartext.
The following was done on Kali linux:
apt-get install inetutils-inetd fingerd
Start the service:
/etc/init.d/inetutils-inetd start
Verification Steps
Install fingerd
Start msfconsole
Do:
use auxiliary/scanner/finger/finger_users
Do:
set rhosts
Do:
run
Options
USERS_FILE
The USERS_FILE is a newline delimited list of users and defaults to unix_users.txt
included with metasploit.
Scenarios
A run against the configuration from these docs
Confirming using NMAP
Utilizing the finger script