CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/post/multi/recon/reverse_lookup.md
Views: 11784

Vulnerable Application

This module reverse resolves an IP address or IP address range to hostnames.

Verification Steps

  1. Start msfconsole

  2. Get a session

  3. Do: use post/multi/recon/reverse_lookup

  4. Do: set SESSION <session id>

  5. Do: set ADDRESS <IP address> or set RANGE <IP address range>

  6. Do: run

Options

ADDRESS

IP address to resolve.

RANGE

IP address range to resolve.

Scenarios

Windows Server 2016 (x86_64)

msf6 > use post/multi/recon/reverse_lookup msf6 post(multi/recon/reverse_lookup) > set address 1.1.1.1 address => 1.1.1.1 msf6 post(multi/recon/reverse_lookup) > set session 1 session => 1 msf6 post(multi/recon/reverse_lookup) > run [*] Resolving 1.1.1.1 [+] 1.1.1.1 resolves to one.one.one.one [*] Post module execution completed

Solaris 11.3 (x86_64)

msf6 > use post/multi/recon/reverse_lookup msf6 post(multi/recon/reverse_lookup) > set address 1.1.1.1 address => 1.1.1.1 msf6 post(multi/recon/reverse_lookup) > set session 1 session => 1 msf6 post(multi/recon/reverse_lookup) > run [*] Resolving 1.1.1.1 [+] 1.1.1.1 resolves to one.one.one.one [*] Post module execution completed

Ubuntu Linux 22.04.1 (x86_64)

msf6 > use post/multi/recon/reverse_lookup msf6 post(multi/recon/reverse_lookup) > set address 1.1.1.1 address => 1.1.1.1 msf6 post(multi/recon/reverse_lookup) > set session 1 session => 1 msf6 post(multi/recon/reverse_lookup) > run [!] SESSION may not be compatible with this module: [!] * missing Meterpreter features: stdapi_railgun_memread, stdapi_railgun_api [*] Resolving 1.1.1.1 [+] 1.1.1.1 resolves to one.one.one.one [*] Post module execution completed