Metasploit mailing list archives

Re: Search Exploit/Auxiliary by "option"


From: Ulisses Castro <uss.thebug () gmail com>
Date: Thu, 22 Jul 2010 01:03:09 -0300

I got this solved, so...

While waiting to this "dumb" solution:
---
$ pwd
/pentest/framework3/modules

$ for mod in $(find . -type f -iname '*.rb' | cut -f2- -d'/' | egrep
-v '(^payloads|^nops|^encoders|/fileformat/|/browser/)' | cut -f2-
-d'/' | cut -f1 -d'.'); do echo $mod; ../msfcli $mod O | grep -v
RHOSTS | grep RHOST && echo $mod >> /tmp/rhost_module_filtered.txt;
done
---

I wrote a little piece of python code to search in all modules
(aux/xpl) and I want to share, so feel free to modify, copy, use,
etc..

http://dpaste.com/hold/220737/

I love use xml-rpc to control msf, that is a GREAT feature and its ... thanks.

Cheers,

Ulisses

On Tue, Jul 20, 2010 at 3:38 PM, Ulisses Castro <uss.thebug () gmail com> wrote:
Hello fellows,

I'm trying without success with some greps/egreps to filter all
exploit/auxiliary that use option RHOST and not RHOSTS and is not
browser or fileformat type.

---
$ pwd
/pentest/framework3/modules

$ grep -irl "\[ 'Automatic'\, { } \]" * | grep -iv \.svn | egrep -v
'(browser|fileformat)'
exploits/linux/mysql/mysql_yassl_getname.rb
exploits/multi/http/jboss_maindeployer.rb
exploits/multi/http/sun_jsws_dav_options.rb
exploits/multi/http/tomcat_mgr_deploy.rb
exploits/test/dialup.rb
exploits/unix/http/contentkeeperweb_mimencode.rb
exploits/windows/backdoor/energizer_duo_payload.rb
exploits/windows/iis/iis_webdav_upload_asp.rb
exploits/windows/iis/ms01_026_dbldecode.rb
exploits/windows/imap/eudora_list.rb
exploits/windows/mssql/lyris_listmanager_weak_pass.rb
exploits/windows/mssql/ms09_004_sp_replwritetovarbin.rb
exploits/windows/mssql/mssql_payload.rb
exploits/windows/oracle/tns_auth_sesskey.rb
exploits/windows/smb/psexec.rb
exploits/windows/smb/smb_relay.rb
---

But grep above don't bring me all exploit/auxiliary correctly, as
example it don't show phpmyadmin module.

Btw, I can't use search command too..
---
msf > search -h
Usage: search [options] [regex]

OPTIONS:

   -h        Help banner.
   -r <opt>  Minimum rank to return
(manual|low|average|normal|good|great|excellent)
   -t <opt>  Type of module to search for
(all|auxiliary|encoder|exploit|nop|payload)
---

There is a easy way to search this or some clues in how to modify
search command ?

Cheers,

- Ulisses

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: