Metasploit mailing list archives

(no subject)


From: kalgecin at gmail.com (kalgecin at gmail.com)
Date: Fri, 23 Jan 2009 18:11:39 +0300

Ok so i managed to create a ruby script to examine the output of nmap.
Now what i face is creating a database of the exploits available in
metasploit what i require is:
service eg. ssh,ftp,http
version e.g OpenSSH 5.1 (protocol 2.0)
exploit e.g. bsdi/softcart/mercantec_softcart

is there a way to dump all the exploits in metasploit to a txt file?

On 1/23/09, H D Moore <hdm at metasploit.com> wrote:
That is basically what db_autopwn does now. If you import a Nessus scan
result, it will cross-reference the vulnerability IDs for you as well,
with Nmap it just matches default ports.

On Fri, 2009-01-23 at 09:31 +0300, kalgecin at gmail.com wrote:
If there's a way to see all the exploits available on the framework,
it's possible to create a script to run nmap with version detection,
list the versions and compare them to the exploits to see if one is
available


_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework




Current thread: