Metasploit mailing list archives

Re: Choosing the appropriate exploit/vulnerability


From: Robert Portvliet <robert.portvliet () gmail com>
Date: Sat, 14 Aug 2010 10:58:43 -0400

One you have scanned your machines using either db_nmap -sV -sO (or
-A) or using Nessus & then importing your results into the Metasploit
database using db_import_nessus_nbe , you can run db_autopwn -x -t to
list all exploits that match up to individual services on each
machine.

Check out the information gathering & vulnerability scanning sections
of http://www.offensive-security.com/metasploit-unleashed/.



On Fri, Aug 13, 2010 at 4:35 PM, Bryan Sudduth <sudduth () gmail com> wrote:

I have newly installed metasploit, can successfully scan a host and store results in the database, but my question:  
how does one know which services are vulnerable AND which "exploit" to be used to exploit the vulnerability?
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: