Metasploit mailing list archives
Re: Autopwn
From: Zate Berg <zate75 () gmail com>
Date: Mon, 4 Oct 2010 14:09:03 -0400
Been informed off list that db_autopwn allows for regex. db_autopwn accepts a regex -m [regex] Only run modules whose name matches the regex only issue with that I see is that the naming of modules isn't consistent with arch/os at times, but the regex is good info to know. Zate On Mon, Oct 4, 2010 at 12:45 PM, Zate Berg <zate75 () gmail com> wrote:
I don't believe it currently does this. Perhaps the command needs to be able to accept an arch or os type to restrict the vulnerabilities that it returns, or perhaps it needs the ability to specify a specific exploit on the db_autopwn switches to run only that exploit across all hosts in the workspace? i am doing some digging in regards to how db_autopwn works to be used with the nessus plugin to get more accurate results on matching nessus plugins to exploits and that might help with this. Zate On Mon, Oct 4, 2010 at 12:15 PM, John Nash <rootsecurityfreak () gmail com> wrote:Hello All, I have used db_nmap to get all the ports on a remote system. I also know the remote system is windows. I now need to run db_autopwn -p -e -t but I want to ensure that it only uses windows exploits and not linux ones for the matching port. Is there some way I can do this? Regards, JN _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Autopwn John Nash (Oct 04)
- Re: Autopwn Zate Berg (Oct 04)
- Re: Autopwn Zate Berg (Oct 04)
- Re: Autopwn Zate Berg (Oct 04)