Metasploit mailing list archives

[PATCH] automatic version scanner


From: Hauke Mehrtens <hauke () hauke-m de>
Date: Sun, 06 Feb 2011 21:36:58 +0100

The new auto_scanner does a tcp port scan on the attacked hosts at first
and then runs the version scanners integrated in msf to get the exact
version of a services running on the host. This is mostly what nmap does
with the -sV option given, but this uses the metasploit auxiliaries to
do the version detection. ;-)

The second patch writes the operating system version detected through
http or smb into the hosts table in the database.

With this patch it is easily possible to perform a network scan through
a pivoted host.

This is not complete yet, but works. This should be extended, to be able
to give a hole subnet like 192.168.0.0/24 and a ping scan should be
performed before the tcp port scan. For some version scanners the
default port numbers are missing, because I could not find them with
some searching in Google, this should be extended.

Are there some other this missing or should I do some parts in an other
way? If the patches are OK I would like to see then in the metasploit
repository.

Hauke

Attachment: 0002-write-operation-system-name-from-smb-and-http-versio.patch
Description:

Attachment: 0001-add-version-auto-scanner.patch
Description:

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: