Metasploit mailing list archives

(no subject)


From: hdm at metasploit.com (H D Moore)
Date: Fri, 23 Jan 2009 09:27:31 -0600

Most of this work has already been done, there is a backend database, a
nmap output parser (which I believe now stores the version information).
The metasploit modules dont have any way to match this version
information, besides port number and vulnerability references. If you
want to see some examples of scripting module inspection, look at
tools/module_references.rb

-HD

On Fri, 2009-01-23 at 18:11 +0300, kalgecin at gmail.com wrote:
Ok so i managed to create a ruby script to examine the output of nmap.
Now what i face is creating a database of the exploits available in
metasploit what i require is:
service eg. ssh,ftp,http
version e.g OpenSSH 5.1 (protocol 2.0)
exploit e.g. bsdi/softcart/mercantec_softcart

is there a way to dump all the exploits in metasploit to a txt file?

On 1/23/09, H D Moore <hdm at metasploit.com> wrote:
That is basically what db_autopwn does now. If you import a Nessus scan
result, it will cross-reference the vulnerability IDs for you as well,
with Nmap it just matches default ports.





Current thread: