Metasploit mailing list archives

MetaScanner V1.0


From: kalgecin at gmail.com (kalgecin at gmail.com)
Date: Thu, 29 Jan 2009 16:14:51 +0300

that's correct

On 1/29/09, rOgUe <wullie19 at ntlworld.com> wrote:
HI kalgecin

Just wanted to make sure ive got this right. Where autopwn with nmap matches
exploits based on what port is open regardless of OS and services running,
your scanner matches up exploits relating to what OS service and version are
running on the target?

-rogue



On Tuesday 27 January 2009 03:06:44 kalgecin at gmail.com wrote:
Hmm... never actually seen the source code for this auxiliary but it
appears to me that it scans for a built in browser/smb MetaScan scans
all the services (thanks to nmap) and compares those services to an
exploit database that can be updated.

On 1/26/09, Rob Fuller <mubix at room362.com> wrote:
How does this tool accomplish this better than the autopwn features in
Metasploit? Not trying to be cynical, just trying to get more
information
on
the function of the tool.

On Mon, Jan 26, 2009 at 10:56 AM, kalgecin at gmail.com

<kalgecin at gmail.com>wrote:
I've finally managed to write a scanner that uses nmap to scan a
target and parse metasploit exploits to easilly detect vulnerabilities
for which the framework already has Please check my blog at
http://kalgecin.blogspot.com/ for more info
Thanks to all those who gave me some support :)
_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework

_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework

_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework




Current thread: