Metasploit mailing list archives

[tool] MetaScanner V1.1


From: mubix at room362.com (Rob Fuller)
Date: Wed, 4 Feb 2009 00:23:43 -0500

   - Error checking to see if Database2.db is present, and if not, have it
   download and/or run scan_meta.
   - It did not find any exploits available for an unpatched XPSP2 machine
   with 137, 139, and 445 open.
   - It doesn't show that I can put any nmap readable ip or range, it looks
   like all I can in put is a sing IP.
   - When specifying the OSs, if there are multiple IPs it doesnt tell you
   which one you are specifying, just the OS detection that nmap gave
   - It fails to do anything if a range is specified


On Tue, Feb 3, 2009 at 3:55 PM, kalgecin at gmail.com <kalgecin at gmail.com>wrote:

i am happy to announce that MetaScanner V1.1 is out now!
-what is it?-
MetaScanner is a script in ruby to scan a host for exploits than are
already in metasploit framework.
-what is it not?-
this is not a vulnerability scanner and may report some few false puritives
-what for?-
how many times have you scanned a host using nmap and then tried
different exploits from the framework? this tool automates that for
you.
-wow where can i find it?-
you can find it on http://kalgecin.110mb.com

--
Sent from Gmail for mobile | mobile.google.com
_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090204/e147f342/attachment.htm>


Current thread: