# VMware ESX / vCenter Pentesting {{#include ../../banners/hacktricks-training.md}} ## 열거 ```bash nmap -sV --script "http-vmware-path-vuln or vmware-version" -p msf> use auxiliary/scanner/vmware/esx_fingerprint msf> use auxiliary/scanner/http/ms15_034_http_sys_memory_dump ``` ## Bruteforce ```bash msf> auxiliary/scanner/vmware/vmware_http_login ``` 유효한 credentials를 찾으면 추가적인 metasploit scanner modules를 사용해 정보를 얻을 수 있습니다. ### 참고 Linux LPE via VMware Tools service discovery (CWE-426 / CVE-2025-41244): {{#ref}} ../../linux-hardening/privilege-escalation/vmware-tools-service-discovery-untrusted-search-path-cve-2025-41244.md {{#endref}} {{#include ../../banners/hacktricks-training.md}}