Metasploit mailing list archives
(no subject)
From: hdm at metasploit.com (H D Moore)
Date: Fri, 23 Jan 2009 09:27:31 -0600
Most of this work has already been done, there is a backend database, a nmap output parser (which I believe now stores the version information). The metasploit modules dont have any way to match this version information, besides port number and vulnerability references. If you want to see some examples of scripting module inspection, look at tools/module_references.rb -HD On Fri, 2009-01-23 at 18:11 +0300, kalgecin at gmail.com wrote:
Ok so i managed to create a ruby script to examine the output of nmap. Now what i face is creating a database of the exploits available in metasploit what i require is: service eg. ssh,ftp,http version e.g OpenSSH 5.1 (protocol 2.0) exploit e.g. bsdi/softcart/mercantec_softcart is there a way to dump all the exploits in metasploit to a txt file? On 1/23/09, H D Moore <hdm at metasploit.com> wrote:That is basically what db_autopwn does now. If you import a Nessus scan result, it will cross-reference the vulnerability IDs for you as well, with Nmap it just matches default ports.
Current thread:
- (no subject) kalgecin at gmail.com (Jan 22)
- (no subject) Nelson (Jan 22)
- (no subject) kalgecin at gmail.com (Jan 22)
- (no subject) webDEViL (Jan 22)
- (no subject) H D Moore (Jan 22)
- (no subject) kalgecin at gmail.com (Jan 23)
- (no subject) H D Moore (Jan 23)
- (no subject) kalgecin at gmail.com (Jan 22)
- (no subject) Nelson (Jan 22)
- <Possible follow-ups>
- (no subject) Irfan Akbar (Mar 13)