Metasploit mailing list archives
Re: Choosing the appropriate exploit/vulnerability
From: Robert Portvliet <robert.portvliet () gmail com>
Date: Sat, 14 Aug 2010 10:58:43 -0400
One you have scanned your machines using either db_nmap -sV -sO (or -A) or using Nessus & then importing your results into the Metasploit database using db_import_nessus_nbe , you can run db_autopwn -x -t to list all exploits that match up to individual services on each machine. Check out the information gathering & vulnerability scanning sections of http://www.offensive-security.com/metasploit-unleashed/. On Fri, Aug 13, 2010 at 4:35 PM, Bryan Sudduth <sudduth () gmail com> wrote:
I have newly installed metasploit, can successfully scan a host and store results in the database, but my question: how does one know which services are vulnerable AND which "exploit" to be used to exploit the vulnerability? _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Choosing the appropriate exploit/vulnerability Bryan Sudduth (Aug 13)
- Re: Choosing the appropriate exploit/vulnerability Robert Portvliet (Aug 14)