Metasploit mailing list archives

MetaScanner V1.0


From: wullie19 at ntlworld.com (rOgUe)
Date: Thu, 29 Jan 2009 14:33:10 +0000

That sounds great 
ill be sure to give it a try ;-)

-rogue

On Thursday 29 January 2009 13:14:51 you wrote:
that's correct

On 1/29/09, rOgUe <wullie19 at ntlworld.com> wrote:
HI kalgecin

Just wanted to make sure ive got this right. Where autopwn with nmap
matches exploits based on what port is open regardless of OS and services
running, your scanner matches up exploits relating to what OS service and
version are running on the target?

-rogue

On Tuesday 27 January 2009 03:06:44 kalgecin at gmail.com wrote:
Hmm... never actually seen the source code for this auxiliary but it
appears to me that it scans for a built in browser/smb MetaScan scans
all the services (thanks to nmap) and compares those services to an
exploit database that can be updated.

On 1/26/09, Rob Fuller <mubix at room362.com> wrote:
How does this tool accomplish this better than the autopwn features in
Metasploit? Not trying to be cynical, just trying to get more
information
on
the function of the tool.

On Mon, Jan 26, 2009 at 10:56 AM, kalgecin at gmail.com

<kalgecin at gmail.com>wrote:
I've finally managed to write a scanner that uses nmap to scan a
target and parse metasploit exploits to easilly detect
vulnerabilities for which the framework already has Please check my
blog at
http://kalgecin.blogspot.com/ for more info
Thanks to all those who gave me some support :)
_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework

_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework

_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework




Current thread: