Metasploit mailing list archives

[tool] MetaScanner V1.1


From: kalgecin at gmail.com (kalgecin at gmail.com)
Date: Wed, 4 Feb 2009 08:15:14 -0800

ok please first try to do manually like try the MS08-067 manually
through the Metasploit framework, the attach nmapoutput.txt, debug.txt
and you MetaScanner output. I'll see whats the problem

On 2/4/09, christopher.riley at r-it.at <christopher.riley at r-it.at> wrote:
is there any exploit on metasploit for your unpatched XPSP2?

I'd guess there are going to be a number available, including MS08-067.

Chris John Riley

framework-bounces at spool.metasploit.com@inet wrote on 04.02.2009 06:41:12:

Ok so first download and run meta_scan.rb(you have to change the
location of you framework), secondly i never meant the script to run
on multiple hosts at ones and thirdly is there any exploit on
metasploit for your unpatched XPSP2?
Please attach nmapoutput.txt and debug.txt to me the next time :) and
yes this script relies on the nmap output if there's no output then
it's just too bad :(

On 2/4/09, Rob Fuller <mubix at room362.com> wrote:
   - Error checking to see if Database2.db is present, and if not, have
it
   download and/or run scan_meta.
   - It did not find any exploits available for an unpatched XPSP2
machine
   with 137, 139, and 445 open.
   - It doesn't show that I can put any nmap readable ip or range, it
looks
   like all I can in put is a sing IP.
   - When specifying the OSs, if there are multiple IPs it doesnt tell
you
   which one you are specifying, just the OS detection that nmap gave
   - It fails to do anything if a range is specified


On Tue, Feb 3, 2009 at 3:55 PM, kalgecin at gmail.com
<kalgecin at gmail.com>wrote:

i am happy to announce that MetaScanner V1.1 is out now!
-what is it?-
MetaScanner is a script in ruby to scan a host for exploits than are
already in metasploit framework.
-what is it not?-
this is not a vulnerability scanner and may report some few false
puritives
-what for?-
how many times have you scanned a host using nmap and then tried
different exploits from the framework? this tool automates that for
you.
-wow where can i find it?-
you can find it on http://kalgecin.110mb.com

--
Sent from Gmail for mobile | mobile.google.com
_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework


_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework

----------------------------------------
Raiffeisen Informatik GmbH, Firmenbuchnr. 88239p, Handelsgericht Wien, DVR
0486809, UID ATU 16351908

Der Austausch von Nachrichten mit oben angefuehrtem Absender via E-Mail
dient ausschliesslich Informationszwecken. Rechtsgeschaeftliche
Erklaerungen duerfen ueber dieses Medium nicht ausgetauscht werden.
Correspondence with above mentioned sender via e-mail is only for
information purposes. This medium may not be used for exchange of
legally-binding communications.
----------------------------------------




Current thread: