Metasploit mailing list archives

Fwd: Socket used in Scruby


From: btricha at gmail.com (Bryan Richardson)
Date: Thu, 14 May 2009 15:43:03 -0600

Forgot to send this to the mailing list instead of just HD.  Also, I wanted
to ask what the advantage is of using these new port scan modules vs. using
nmap.  Is it just to replace nmap?

---------- Forwarded message ----------
From: Bryan Richardson <btricha at gmail.com>
Date: Thu, May 14, 2009 at 3:40 PM
Subject: Re: [framework] Socket used in Scruby
To: H D Moore <hdm at metasploit.com>


Okay... but isn't the raw packet packaged up as a TCP packet on the attacker
machine?  Then, if it's targeted for a network being routed via a
Meterpreter pivot, Rex could send it via the pwned machine?  Maybe I'm
misunderstanding something...

Hmmm... is there any description of these new port scan modules on the
Metasploit site currently?  Sounds interesting!!!


On Thu, May 14, 2009 at 3:30 PM, H D Moore <hdm at metasploit.com> wrote:

On Thu, 14 May 2009 16:17:34 -0500, Bryan Richardson <btricha at gmail.com>
wrote:

So... will PacketFu use the Rex library to send packets out?  I'm just
wanting to be able to craft packets and send them to a target via a
Meterpreter pivot.


Meterpreter can't send raw packets anyways, only normal TCP communication
(and even that, somewhat poorly right now, all operations are blocking).
PacketFu is used by the new port scan modules (syn.rb) with Rex sockets.


-HD


_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090514/1b3684a1/attachment-0001.htm>


Current thread: