Metasploit mailing list archives
(no subject)
From: kalgecin at gmail.com (kalgecin at gmail.com)
Date: Fri, 23 Jan 2009 18:11:39 +0300
Ok so i managed to create a ruby script to examine the output of nmap. Now what i face is creating a database of the exploits available in metasploit what i require is: service eg. ssh,ftp,http version e.g OpenSSH 5.1 (protocol 2.0) exploit e.g. bsdi/softcart/mercantec_softcart is there a way to dump all the exploits in metasploit to a txt file? On 1/23/09, H D Moore <hdm at metasploit.com> wrote:
That is basically what db_autopwn does now. If you import a Nessus scan result, it will cross-reference the vulnerability IDs for you as well, with Nmap it just matches default ports. On Fri, 2009-01-23 at 09:31 +0300, kalgecin at gmail.com wrote:If there's a way to see all the exploits available on the framework, it's possible to create a script to run nmap with version detection, list the versions and compare them to the exploits to see if one is available_______________________________________________ http://spool.metasploit.com/mailman/listinfo/framework
Current thread:
- (no subject) kalgecin at gmail.com (Jan 22)
- (no subject) Nelson (Jan 22)
- (no subject) kalgecin at gmail.com (Jan 22)
- (no subject) webDEViL (Jan 22)
- (no subject) H D Moore (Jan 22)
- (no subject) kalgecin at gmail.com (Jan 23)
- (no subject) H D Moore (Jan 23)
- (no subject) kalgecin at gmail.com (Jan 22)
- (no subject) Nelson (Jan 22)
- <Possible follow-ups>
- (no subject) Irfan Akbar (Mar 13)