Metasploit mailing list archives

Rfind 0.47


From: basehat at gmail.com (base64)
Date: Tue, 27 Jan 2009 12:09:00 -0800

Hello all!

Maybe this can be of use to someone.

A while back I've written a multi-threaded TCP port scanner in ruby, that
attempts to be as fast as possible and has the ability to use the metasploit
CLI or other external tools.  It's still a bit rough, and the only service
detection at this point is microsoft dns server.  Msdns server detection
(using FPDNS) can be used with the related msf exploit module.

Tested on win32, *nix, iphone.

Note that while stealth scans can likely be implemented in ruby, this
scanner does no such thing.

//project page
http://basesixtyfour.com/projects/rfind

//BT3 module
http://basesixtyfour.com/code/dl/L3J1YnkvcmZpbmQvcmZpbmQubHpt<http://basesixtyfour.com/code/ruby/rfind>


Attached are some scripts for msfcli automatedness.  Excuse me if
attachments aren't allowed.

-- 

Best Regards,
Adrian Castro
Senior Software Engineer
(310)765-0627
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090127/5abdd859/attachment.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: rfind.zip
Type: application/zip
Size: 4688 bytes
Desc: not available
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090127/5abdd859/attachment.zip>


Current thread: