Metasploit mailing list archives
Re: Search Exploit/Auxiliary by "option"
From: Ulisses Castro <uss.thebug () gmail com>
Date: Thu, 22 Jul 2010 01:03:09 -0300
I got this solved, so... While waiting to this "dumb" solution: --- $ pwd /pentest/framework3/modules $ for mod in $(find . -type f -iname '*.rb' | cut -f2- -d'/' | egrep -v '(^payloads|^nops|^encoders|/fileformat/|/browser/)' | cut -f2- -d'/' | cut -f1 -d'.'); do echo $mod; ../msfcli $mod O | grep -v RHOSTS | grep RHOST && echo $mod >> /tmp/rhost_module_filtered.txt; done --- I wrote a little piece of python code to search in all modules (aux/xpl) and I want to share, so feel free to modify, copy, use, etc.. http://dpaste.com/hold/220737/ I love use xml-rpc to control msf, that is a GREAT feature and its ... thanks. Cheers, Ulisses On Tue, Jul 20, 2010 at 3:38 PM, Ulisses Castro <uss.thebug () gmail com> wrote:
Hello fellows, I'm trying without success with some greps/egreps to filter all exploit/auxiliary that use option RHOST and not RHOSTS and is not browser or fileformat type. --- $ pwd /pentest/framework3/modules $ grep -irl "\[ 'Automatic'\, { } \]" * | grep -iv \.svn | egrep -v '(browser|fileformat)' exploits/linux/mysql/mysql_yassl_getname.rb exploits/multi/http/jboss_maindeployer.rb exploits/multi/http/sun_jsws_dav_options.rb exploits/multi/http/tomcat_mgr_deploy.rb exploits/test/dialup.rb exploits/unix/http/contentkeeperweb_mimencode.rb exploits/windows/backdoor/energizer_duo_payload.rb exploits/windows/iis/iis_webdav_upload_asp.rb exploits/windows/iis/ms01_026_dbldecode.rb exploits/windows/imap/eudora_list.rb exploits/windows/mssql/lyris_listmanager_weak_pass.rb exploits/windows/mssql/ms09_004_sp_replwritetovarbin.rb exploits/windows/mssql/mssql_payload.rb exploits/windows/oracle/tns_auth_sesskey.rb exploits/windows/smb/psexec.rb exploits/windows/smb/smb_relay.rb --- But grep above don't bring me all exploit/auxiliary correctly, as example it don't show phpmyadmin module. Btw, I can't use search command too.. --- msf > search -h Usage: search [options] [regex] OPTIONS: -h Help banner. -r <opt> Minimum rank to return (manual|low|average|normal|good|great|excellent) -t <opt> Type of module to search for (all|auxiliary|encoder|exploit|nop|payload) --- There is a easy way to search this or some clues in how to modify search command ? Cheers, - Ulisses
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Search Exploit/Auxiliary by "option" Ulisses Castro (Jul 20)
- Re: Search Exploit/Auxiliary by "option" Ulisses Castro (Jul 21)