Metasploit mailing list archives
Integration with other tools
From: joxeankoret at yahoo.es (Joxean Koret)
Date: Tue, 27 Nov 2007 19:23:27 +0100
Hi Jerome, On mar, 2007-11-27 at 08:36 +0100, Jerome Athias wrote:
PS: going further will let you think about automatically updating the needed ret address, based on the os fingerprinting, using another database, just before launching your exploit ;p
That's exactly what I'm searching for. I have reliable ways to identify the remote os and service pack/kernel version for some operating systems and also the vulnerable application version for some services. Many of these have their respective exploit(s) in the Metasploit repository but I can't find a way to correctly assign a list of modules associated with the vuln and the os+sp level/os level/kernel version to adjust the retaddress/specific os option, etc... Any tip? Regards, Joxean Koret -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 191 bytes Desc: This is a digitally signed message part URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071127/9e202378/attachment.pgp>
Current thread:
- Integration with other tools Joxean Koret (Nov 26)
- Integration with other tools Jerome Athias (Nov 26)
- Integration with other tools Joxean Koret (Nov 27)
- Integration with other tools H D Moore (Nov 27)
- Integration with other tools Jerome Athias (Nov 27)
- Integration with other tools Joxean Koret (Nov 27)
- Integration with other tools Jerome Athias (Nov 26)