background image

M E T A S P L O I T   A U X I L I A R Y  


When most people think of Metasploit, exploits come 
to mind. Exploits are cool, exploits get you shell, and 
exploits get all the attention. But sometimes you need 
something more than that. By definition, a Metasploit 
module that is not an exploit is an 

auxiliary module

which leaves a lot to the imagination.

In addition to providing valuable reconnaissance tools such as port 

scanners and service fingerprinters, auxiliary modules such as 



take a known list of usernames and passwords and then attempt to log in 
via brute force across an entire target network. Also included in the auxiliary 
modules are various protocol fuzzers such as 





, and more. You can launch these fuzzers at a 

target service in hopes of finding your own vulnerabilities to exploit.

Just because auxiliary modules don’t have a payload, don’t think you 

won’t use them. But before we dive into their myriad uses, here’s an overview 
to help you see what we are dealing with.