Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Process Metasploit Exploits output #154

Open
grutz opened this issue Jan 2, 2015 · 0 comments
Open

Process Metasploit Exploits output #154

grutz opened this issue Jan 2, 2015 · 0 comments
Assignees
Milestone

Comments

@grutz
Copy link
Contributor

grutz commented Jan 2, 2015

A list of exploits and references can be generated using tools/module_reference.rb:

$ tools/module_reference.rb -h

Metasploit Script for Displaying Module Reference information.
==========================================================

OPTIONS:

    -c        Check reference status
    -f <opt>  Filter based on Module Type [All,Exploit,Payload,Post,NOP,Encoder,Auxiliary] (Default = ALL).
    -h        Help menu.
    -o <opt>  Save the results to a file
    -r        Reverse Sort
    -s        Sort by Reference instead of Module Type.
    -t <opt>  Type of Reference to sort by ["ALL", "OSVDB", "CVE", "CWE", "BID", "MSB", "EDB", "US-CERT-VU", "ZDI", "WPVDB", "URL"]
    -x <opt>  String or RegEx to try and match against the Reference Field

Kvasir should parse the result and anything with a CVE should be added to the t_exploits table. If a valid MSFRPC instance module.info should be called to get more details but this is a separate function yet to be written.

@grutz grutz self-assigned this Jan 2, 2015
@grutz grutz modified the milestones: 1.1.0, 1.1.1 Jan 2, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant