Metasploit mailing list archives
autopwn
From: dguido at gmail.com (Daniel Guido)
Date: Thu, 7 Feb 2008 16:39:28 -0500
I got it to work last night using the commands from HDM's blog post. It was pretty easy and I'm glad there wasn't a dependency on PostgreSQL, SQLite worked just fine. One thing I didn't realize was just how insufficient Nmap output was in automatically determining which exploits to run. If I'm running 'nmap -A' isn't there any more information that can be extracted from the results so that I don't run almost every port 80 exploit against every host running a webserver? I haven't tried Nessus yet... maybe tomorrow. On Feb 7, 2008 1:39 PM, Ronald L. Rosson Jr. <ron at oneinsane.net> wrote:
On Feb 6, 2008, at 11:12 AM, Abhijeet Hatekar wrote:use Fasttrack.py from BT3. Its menu based,much simpler and makes all the autopwn things transparent to user.It would be nice to have some of the supporting scripts for that as well outside of BT3. -Ron
-- Dan Guido
Current thread:
- autopwn Daniel Guido (Feb 06)
- autopwn H D Moore (Feb 06)
- autopwn Abhijeet Hatekar (Feb 06)
- autopwn Ronald L. Rosson Jr. (Feb 07)
- autopwn Daniel Guido (Feb 07)
- autopwn H D Moore (Feb 07)
- How touse db_mysql plugin in metasploit 3 Prince Brave (Feb 08)
- autopwn Ronald L. Rosson Jr. (Feb 07)