Metasploit mailing list archives
Rfind 0.47
From: basehat at gmail.com (base64)
Date: Tue, 27 Jan 2009 12:09:00 -0800
Hello all! Maybe this can be of use to someone. A while back I've written a multi-threaded TCP port scanner in ruby, that attempts to be as fast as possible and has the ability to use the metasploit CLI or other external tools. It's still a bit rough, and the only service detection at this point is microsoft dns server. Msdns server detection (using FPDNS) can be used with the related msf exploit module. Tested on win32, *nix, iphone. Note that while stealth scans can likely be implemented in ruby, this scanner does no such thing. //project page http://basesixtyfour.com/projects/rfind //BT3 module http://basesixtyfour.com/code/dl/L3J1YnkvcmZpbmQvcmZpbmQubHpt<http://basesixtyfour.com/code/ruby/rfind> Attached are some scripts for msfcli automatedness. Excuse me if attachments aren't allowed. -- Best Regards, Adrian Castro Senior Software Engineer (310)765-0627 -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090127/5abdd859/attachment.htm> -------------- next part -------------- A non-text attachment was scrubbed... Name: rfind.zip Type: application/zip Size: 4688 bytes Desc: not available URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090127/5abdd859/attachment.zip>
Current thread:
- Rfind 0.47 base64 (Jan 27)