Metasploit mailing list archives
Integration with other tools
From: jerome.athias at free.fr (Jerome Athias)
Date: Tue, 27 Nov 2007 21:22:48 +0100
Attached is a screenshot of a potential way to automatically select an exploit module based on an nmap banner Joxean Koret a ?crit :
Hi Jerome, On mar, 2007-11-27 at 08:36 +0100, Jerome Athias wrote:PS: going further will let you think about automatically updating the needed ret address, based on the os fingerprinting, using another database, just before launching your exploit ;pThat's exactly what I'm searching for. I have reliable ways to identify the remote os and service pack/kernel version for some operating systems and also the vulnerable application version for some services. Many of these have their respective exploit(s) in the Metasploit repository but I can't find a way to correctly assign a list of modules associated with the vuln and the os+sp level/os level/kernel version to adjust the retaddress/specific os option, etc... Any tip? Regards, Joxean Koret
-------------- next part -------------- A non-text attachment was scrubbed... Name: msf-nmap.png Type: image/png Size: 254287 bytes Desc: not available URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071127/10444c51/attachment.png> -------------- next part -------------- A non-text attachment was scrubbed... Name: smime.p7s Type: application/x-pkcs7-signature Size: 3253 bytes Desc: S/MIME Cryptographic Signature URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071127/10444c51/attachment.bin>
Current thread:
- Integration with other tools Joxean Koret (Nov 26)
- Integration with other tools Jerome Athias (Nov 26)
- Integration with other tools Joxean Koret (Nov 27)
- Integration with other tools H D Moore (Nov 27)
- Integration with other tools Jerome Athias (Nov 27)
- Integration with other tools Joxean Koret (Nov 27)
- Integration with other tools Jerome Athias (Nov 26)