Metasploit mailing list archives
(no subject)
From: hdm at metasploit.com (H D Moore)
Date: Fri, 23 Jan 2009 01:30:41 -0600
That is basically what db_autopwn does now. If you import a Nessus scan result, it will cross-reference the vulnerability IDs for you as well, with Nmap it just matches default ports. On Fri, 2009-01-23 at 09:31 +0300, kalgecin at gmail.com wrote:
If there's a way to see all the exploits available on the framework, it's possible to create a script to run nmap with version detection, list the versions and compare them to the exploits to see if one is available
Current thread:
- (no subject) kalgecin at gmail.com (Jan 22)
- (no subject) Nelson (Jan 22)
- (no subject) kalgecin at gmail.com (Jan 22)
- (no subject) webDEViL (Jan 22)
- (no subject) H D Moore (Jan 22)
- (no subject) kalgecin at gmail.com (Jan 23)
- (no subject) H D Moore (Jan 23)
- (no subject) kalgecin at gmail.com (Jan 22)
- (no subject) Nelson (Jan 22)
- <Possible follow-ups>
- (no subject) Irfan Akbar (Mar 13)