Metasploit mailing list archives
Exploit docs
From: masgad at gmail.com (M. GAD)
Date: Wed, 29 Oct 2008 11:13:35 +0100
In fact consulting references one by one to find out more information about the exploit is sufficiently tedious. MSF-XB quite facilitate it but we still need to visit several sites. There is a closely related issue: selecting appropriate exploits. As the number of exploits and auxiliary tools increases it will be more difficult to select an appropriate exploit. Although the current GUI or the web interface are supporting module selection either by platform or arch, we need sometimes to make selection based on other criteria a combination of them. For example, selecting an exploit based on the privilege that it provides, according to its launching source, according to the directly involved program (the vulnerable program) , etc. The current implementation of modules has useful information about modules that represent a good basis for this. However, we need to: (1) add more information such as the corresponding CPE entry (Common Platform Enumeration of MITRE) or the attributes of reasonable attack classification (I suggest the one attached with this email) (2) think about importing such information into a backend DB. This will facilitate the selection process as well as allows establishing a link with CVE, OSVDB or CPE detailed data easily. Best regards, M GAD On Wed, Oct 29, 2008 at 12:17 AM, Jerome Athias <jerome.athias at free.fr> wrote:
An other ad for my MSF-XB :p (if you're a Windows user); when using the XB Editor you will show the list of references (CVE, BID, OVSDB, Milw0rm...) and one click will open your browser on the needed web page ;) just a tip. H D Moore a ?crit :Yes, look at the References section of each exploit and look up the CVE, BID, OSVDB, and other references listed there. Some exploits will go into more detail inside the exploit comments, but many of them are simple enough that just referring to the CVE is enough. On Tuesday 28 October 2008, metamaillist wrote:Are there docs on what each exploit is actually exploiting?_______________________________________________ http://spool.metasploit.com/mailman/listinfo/framework
-------------- next part -------------- A non-text attachment was scrubbed... Name: attack-classification.pdf Type: application/pdf Size: 208908 bytes Desc: not available URL: <http://mail.metasploit.com/pipermail/framework/attachments/20081029/77204d0c/attachment.pdf>
Current thread:
- Exploit docs metamaillist (Oct 28)
- Exploit docs H D Moore (Oct 28)
- Exploit docs Jerome Athias (Oct 28)
- Exploit docs M. GAD (Oct 29)
- Exploit docs Jerome Athias (Oct 29)
- Exploit docs M. GAD (Oct 30)
- Exploit docs Jerome Athias (Oct 30)
- Exploit docs H D Moore (Oct 30)
- Exploit docs Jerome Athias (Oct 30)
- Exploit docs Jerome Athias (Oct 28)
- Exploit docs H D Moore (Oct 28)