Metasploit mailing list archives
[PATCH] automatic version scanner
From: Hauke Mehrtens <hauke () hauke-m de>
Date: Sun, 06 Feb 2011 21:36:58 +0100
The new auto_scanner does a tcp port scan on the attacked hosts at first and then runs the version scanners integrated in msf to get the exact version of a services running on the host. This is mostly what nmap does with the -sV option given, but this uses the metasploit auxiliaries to do the version detection. ;-) The second patch writes the operating system version detected through http or smb into the hosts table in the database. With this patch it is easily possible to perform a network scan through a pivoted host. This is not complete yet, but works. This should be extended, to be able to give a hole subnet like 192.168.0.0/24 and a ping scan should be performed before the tcp port scan. For some version scanners the default port numbers are missing, because I could not find them with some searching in Google, this should be extended. Are there some other this missing or should I do some parts in an other way? If the patches are OK I would like to see then in the metasploit repository. Hauke
Attachment:
0002-write-operation-system-name-from-smb-and-http-versio.patch
Description:
Attachment:
0001-add-version-auto-scanner.patch
Description:
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- [PATCH] automatic version scanner Hauke Mehrtens (Feb 06)