Metasploit mailing list archives

MetaScanner V1.0


From: wullie19 at ntlworld.com (rOgUe)
Date: Thu, 29 Jan 2009 13:11:22 +0000

HI kalgecin

Just wanted to make sure ive got this right. Where autopwn with nmap matches 
exploits based on what port is open regardless of OS and services running, 
your scanner matches up exploits relating to what OS service and version are
running on the target?

-rogue 



On Tuesday 27 January 2009 03:06:44 kalgecin at gmail.com wrote:
Hmm... never actually seen the source code for this auxiliary but it
appears to me that it scans for a built in browser/smb MetaScan scans
all the services (thanks to nmap) and compares those services to an
exploit database that can be updated.

On 1/26/09, Rob Fuller <mubix at room362.com> wrote:
How does this tool accomplish this better than the autopwn features in
Metasploit? Not trying to be cynical, just trying to get more information
on
the function of the tool.

On Mon, Jan 26, 2009 at 10:56 AM, kalgecin at gmail.com

<kalgecin at gmail.com>wrote:
I've finally managed to write a scanner that uses nmap to scan a
target and parse metasploit exploits to easilly detect vulnerabilities
for which the framework already has Please check my blog at
http://kalgecin.blogspot.com/ for more info
Thanks to all those who gave me some support :)
_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework

_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework




Current thread: