Metasploit mailing list archives

howto search exploit information


From: tothakosh at gmail.com (Akos Toth)
Date: Wed, 5 Mar 2008 08:28:02 +0100

Thanks a lot. I'll check those out.

Akos

On 3/4/08, H D Moore <hdm at metasploit.com> wrote:
On Tuesday 04 March 2008, Akos Toth wrote:
I'm trying to write a script that would create some link between a
security scanner's XML output and Metasploit's exploit database.
For this I'd need to be able to search all exploit-related information
(RPORT and 'References' would be the most important).

Take a look at tools/module_reference.rb in the distribution

I guess the 'search' command is doing what I need. Could someone
please point me to some resource about how to use regular expressions
with this command?

The search command does not dive into references yet, but an example of
searching name, title, and description:

msf>  search MS0[567]

BTW, what mechanism is behind 'db_autopwn'? I think understanding that
would be of help too.

The code is here:
lib/msf/ui/console/command_dispatcher/db.rb

-p matches by default RPORT
-x matches by CVE/BID/URL/etc

-HD
_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework




Current thread: