Metasploit mailing list archives

[tool] MetaScanner V1.1


From: kalgecin at gmail.com (kalgecin at gmail.com)
Date: Wed, 4 Feb 2009 08:41:12 +0300

Ok so first download and run meta_scan.rb(you have to change the
location of you framework), secondly i never meant the script to run
on multiple hosts at ones and thirdly is there any exploit on
metasploit for your unpatched XPSP2?
Please attach nmapoutput.txt and debug.txt to me the next time :) and
yes this script relies on the nmap output if there's no output then
it's just too bad :(

On 2/4/09, Rob Fuller <mubix at room362.com> wrote:
   - Error checking to see if Database2.db is present, and if not, have it
   download and/or run scan_meta.
   - It did not find any exploits available for an unpatched XPSP2 machine
   with 137, 139, and 445 open.
   - It doesn't show that I can put any nmap readable ip or range, it looks
   like all I can in put is a sing IP.
   - When specifying the OSs, if there are multiple IPs it doesnt tell you
   which one you are specifying, just the OS detection that nmap gave
   - It fails to do anything if a range is specified


On Tue, Feb 3, 2009 at 3:55 PM, kalgecin at gmail.com
<kalgecin at gmail.com>wrote:

i am happy to announce that MetaScanner V1.1 is out now!
-what is it?-
MetaScanner is a script in ruby to scan a host for exploits than are
already in metasploit framework.
-what is it not?-
this is not a vulnerability scanner and may report some few false
puritives
-what for?-
how many times have you scanned a host using nmap and then tried
different exploits from the framework? this tool automates that for
you.
-wow where can i find it?-
you can find it on http://kalgecin.110mb.com

--
Sent from Gmail for mobile | mobile.google.com
_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework





Current thread: