Metasploit mailing list archives

Autopwn question


From: L.vd.Eijk at mindef.nl (L.vd.Eijk at mindef.nl)
Date: Thu, 4 Jan 2007 08:04:00 +0100

Hi list  !
First off all, a good 2007
Regarding the autopwn script. Testing in my lab was great fun with this
nifty little script. The blog entry from HD with the "how-to" was
crystal clear. But how can i find out by wich exploit some off my
servers were hit ?
I first run the db_nmap to fill my database with no -p option and
straight after that the autopwn -p -t -e on the targets. Some off the
targets got 2 to 3 bind shells on them. Sweet off course but with what
exploits ?

Cheers, L

Dit bericht kan informatie bevatten die niet voor u is bestemd. Indien u niet de geadresseerde bent of dit bericht 
abusievelijk aan u is toegezonden, wordt u verzocht dat aan de afzender te melden en het bericht te verwijderen. De 
Staat aanvaardt geen aansprakelijkheid voor schade, van welke aard ook, die verband houdt met risico's verbonden aan 
het elektronisch verzenden van berichten.

This message may contain information that is not intended for you. If you are not the addressee or if this message was 
sent to you by mistake, you are requested to inform the sender and delete the message. The State accepts no liability 
for damage of any kind resulting from the risk inherent in the electronic transmission of messages.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070104/f048169b/attachment.htm>


Current thread: