Metasploit mailing list archives
db_autopwn -m option
From: bcg at struxural.com (Ben Greenfield)
Date: Wed, 9 Sep 2009 14:30:55 -0400
I've got a follow-up question in this same vein. I want to only run windows exploits using db_autopwn. Before I run the exploits, I want to list the ones I'm going to run. Will -p -t combined with -m and a valid regex only display the exploits that will actually be run, or do I have to wait until I add a -e for that list? Can someone please help me out with the correct regex so that I'm only running things from exploit/windows as well. I was using: db_autopwn -p -t -m \bexploit\/windows\/\b <IP> and that didn't work, it listed things from auxiliaries . Thanks in advance, On Mon, Dec 1, 2008 at 1:45 PM, Antonios Atlasis<atlasis at telecom.ece.ntua.gr> wrote:
Thanks a lot HD! I hadn't realised that (how stupid I am)! Take care Antonios Take care Antonios On Mon, December 1, 2008 19:12, H D Moore wrote:You still need to use this in conjunction with either -p or -x, otherwise it doesn't know what modules to run. The -m option is an additional filter, not a new matching mechanism. -HD On Monday 01 December 2008 11:07:33 Antonios Atlasis wrote:I'm not a regex expert (quite the contrary I suppose), but even when I was defining all the possible combinations (alphanumerics plus underscore plus /) no exploit was selected ("[*] Analysis completed in 2.16293501853943 seconds (0 vulns / 0 refs"). Are there any requirements in order to use this option? Any example?_______________________________________________ http://spool.metasploit.com/mailman/listinfo/framework_______________________________________________ http://spool.metasploit.com/mailman/listinfo/framework
Current thread:
- db_autopwn -m option Ben Greenfield (Sep 09)
- db_autopwn -m option HD Moore (Sep 11)