Metasploit mailing list archives

db_autopwn -m option


From: bcg at struxural.com (Ben Greenfield)
Date: Wed, 9 Sep 2009 14:30:55 -0400

I've got a follow-up question in this same vein.  I want to only run
windows exploits using db_autopwn.  Before I run the exploits, I want
to list the ones I'm going to run.  Will -p -t combined with -m and a
valid regex only display the exploits that will actually be run, or do
I have to wait until I add a -e for that list?

Can someone please help me out with the correct regex so that I'm only
running things from exploit/windows as well.  I was using:
db_autopwn -p -t -m \bexploit\/windows\/\b <IP> and that didn't work,
it listed things from auxiliaries .

Thanks in advance,



On Mon, Dec 1, 2008 at 1:45 PM, Antonios
Atlasis<atlasis at telecom.ece.ntua.gr> wrote:
Thanks a lot HD! I hadn't realised that (how stupid I am)!

Take care

Antonios

Take care

Antonios

On Mon, December 1, 2008 19:12, H D Moore wrote:
You still need to use this in conjunction with either -p or -x, otherwise
it doesn't know what modules to run. The -m option is an additional
filter, not a new matching mechanism.

-HD


On Monday 01 December 2008 11:07:33 Antonios Atlasis wrote:

I'm not a regex expert (quite the contrary I suppose), but even when I
was defining all the possible combinations (alphanumerics plus
underscore plus /) no exploit was selected ("[*] Analysis completed in
2.16293501853943
seconds (0 vulns / 0 refs"). Are there any requirements in order to use
this option? Any example?


_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework




_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework



Current thread: