
Metasploit mailing list archives
Exploit docs
From: jerome.athias at free.fr (Jerome Athias)
Date: Wed, 29 Oct 2008 15:59:27 +0100
I agree. I've put exploits modules (of the MSF v2) in a database to use them with theXploiter. https://www.securinfos.info/metasploit/MSF-XB-MCD.png So, I know which exploits target, for example, port 21. theXploiter uses nmap to scan the target and if it find the port 21 open; it shows you directly the possible MSF exploits modules. The launching an exploit, theXploiter will automatically fill the fields like target IP, target Port, and via fingerprinting will try to identify the target system loale and SP, then theXploiter search the most reliable return address to use for this target and launches the attack. I thought also to put exploits modules in XML files, what do you think about it? (even if it would be time consumming at start) Regards /JA M. GAD a ?crit :
In fact consulting references one by one to find out more information about the exploit is sufficiently tedious. MSF-XB quite facilitate it but we still need to visit several sites. There is a closely related issue: selecting appropriate exploits. As the number of exploits and auxiliary tools increases it will be more difficult to select an appropriate exploit. Although the current GUI or the web interface are supporting module selection either by platform or arch, we need sometimes to make selection based on other criteria a combination of them. For example, selecting an exploit based on the privilege that it provides, according to its launching source, according to the directly involved program (the vulnerable program) , etc. The current implementation of modules has useful information about modules that represent a good basis for this. However, we need to: (1) add more information such as the corresponding CPE entry (Common Platform Enumeration of MITRE) or the attributes of reasonable attack classification (I suggest the one attached with this email) (2) think about importing such information into a backend DB. This will facilitate the selection process as well as allows establishing a link with CVE, OSVDB or CPE detailed data easily. Best regards, M GAD
Current thread:
- Exploit docs metamaillist (Oct 28)
- Exploit docs H D Moore (Oct 28)
- Exploit docs Jerome Athias (Oct 28)
- Exploit docs M. GAD (Oct 29)
- Exploit docs Jerome Athias (Oct 29)
- Exploit docs M. GAD (Oct 30)
- Exploit docs Jerome Athias (Oct 30)
- Exploit docs H D Moore (Oct 30)
- Exploit docs Jerome Athias (Oct 30)
- Exploit docs Jerome Athias (Oct 28)
- Exploit docs H D Moore (Oct 28)