Metasploit mailing list archives
MSFConsole - listing modules
From: skoda306 at yahoo.com (daniel)
Date: Thu, 26 Apr 2007 07:50:34 -0700 (PDT)
Sorry I made a silly mistake in the last file I uploaded, I should read/write code while I am awake. Ok I am uploading this new one, should have 0 probl Like I said before You can download and replace /framework/trunk/lib/msf/ui/console/command_dispatcher/core.rb Use: msf > show Snort Exploits ======== Name Description ---- ----------- linux/ids/snortbopre Snort Back Orifice Pre-Preprocessor Remote Exploit I think with the ammount of Exploits/payloads availible, this actually solves the problem, I mean really the longest list is show windows, and even then is not that long. Hope it helps. PD: Been reading the core code, preatty nice how you abstracted everything, and the whole module msf for mixin was a great idea :) kudos for the developers. ----- Original Message ---- From: Spurgeon <spurgeonbj at hotpop.com> To: framework at metasploit.com Sent: Thursday, April 26, 2007 11:18:49 PM Subject: Re: [framework] MSFConsole - listing modules Hi List. Thank you for your responses. I had tried out msfgui yesterday and it's simply fantastic! Regarding the searching of exploits in console mode, If I remember correctly, on 2.x branch (on unices), it is possible to use grep to search like show exploits | grep -i dcom Is a similar approach possible with 3.x? Regards Spurgeon On Tuesday 24 April 2007 19:16, Spurgeon wrote:
Hi List, As an user preferring to use msfconsole, I find the list of exploits getting longer and longer and longer (191 exploits and growing..., which is actually a good thing! :-) ) To cut a long listing short, is there any way where we can have SQL sort of listing like show exploits like '%browser%' or show exploits like 'windows*' or some similar way to query / filter exploits? Regards Spurgeon
__________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070426/febdfa1f/attachment.htm> -------------- next part -------------- A non-text attachment was scrubbed... Name: core.rb Type: application/x-ruby Size: 35994 bytes Desc: not available URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070426/febdfa1f/attachment.rb>
Current thread:
- MSFConsole - listing modules Spurgeon (Apr 24)
- MSFConsole - listing modules H D Moore (Apr 24)
- MSFConsole - listing modules Fabrice MOURRON (Apr 24)
- MSFConsole - listing modules Spurgeon (Apr 26)
- <Possible follow-ups>
- MSFConsole - listing modules daniel (Apr 25)
- MSFConsole - listing modules daniel (Apr 26)
- MSFConsole - listing modules H D Moore (Apr 24)