Nmap Development mailing list archives

Re: [NSE] metasploit-msgrpc-brute


From: Aleksandar Nikolic <nikolic.alek () gmail com>
Date: Sat, 30 Jun 2012 14:04:21 +0200

I've ran a few tests and tweaked brute options to make it work well
with MSF's random delays.
Also , added retries.

This has been commited as 29090.

Aleksandar

On Sat, Jun 30, 2012 at 1:27 AM, David Fifield <david () bamsoftware com> wrote:
On Fri, Jun 29, 2012 at 11:59:36PM +0200, Aleksandar Nikolic wrote:
As for SSL, http lib handles that too.
Also, fingerprints and version probes should be added soon so that
would handle the ,so to say, non-standard ports.

I added a probe and match for this service with these ports:
ports 50505,55552
sslports 3790

Since we can't query the version number directly without authenticating,
I included a large part of the stack trace that the service emits so
that we can match up line numbers to versions.

David Fifield
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: