Rapid7 Vulnerability & Exploit Database

NIS bootparamd Domain Name Disclosure

Back to Search

NIS bootparamd Domain Name Disclosure

Created
06/14/2018

Description

This module discloses the NIS domain name from bootparamd. You must know a client address from the target's bootparams file. Hint: try hosts within the same network range as the target.

Author(s)

  • SATAN
  • pentestmonkey
  • wvu <wvu@metasploit.com>

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/gather/nis_bootparamd_domain
msf auxiliary(nis_bootparamd_domain) > show actions
    ...actions...
msf auxiliary(nis_bootparamd_domain) > set ACTION < action-name >
msf auxiliary(nis_bootparamd_domain) > show options
    ...show and set options...
msf auxiliary(nis_bootparamd_domain) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;