Metasploit mailing list archives
[tool] MetaScanner V1.1
From: kalgecin at gmail.com (kalgecin at gmail.com)
Date: Thu, 5 Feb 2009 05:47:44 +0300
In short the MetaScanner does the following. 1. Generate an exploit database from thr framework directory 2. use nmap to scan the target 3. parse the results for needed values like port number, version, service and OS 4. compare those results to the database
Current thread:
- [tool] MetaScanner V1.1, (continued)
- [tool] MetaScanner V1.1 Rob Fuller (Feb 03)
- [tool] MetaScanner V1.1 kalgecin at gmail.com (Feb 03)
- [tool] MetaScanner V1.1 christopher.riley at r-it.at (Feb 03)
- Message not available
- [tool] MetaScanner V1.1 kalgecin at gmail.com (Feb 04)
- Message not available
- [tool] MetaScanner V1.1 kalgecin at gmail.com (Feb 04)
- [tool] MetaScanner V1.1 kalgecin at gmail.com (Feb 03)
- [tool] MetaScanner V1.1 Rob Fuller (Feb 03)
- [tool] MetaScanner V1.1 kalgecin at gmail.com (Feb 04)
- [tool] MetaScanner V1.1 kalgecin at gmail.com (Feb 04)
- [tool] MetaScanner V1.1 kalgecin at gmail.com (Feb 04)
- [tool] MetaScanner V1.1 kalgecin at gmail.com (Feb 04)
- [tool] MetaScanner V1.1 kalgecin at gmail.com (Feb 05)