Searching exploit modules in Metasploit
Quoted from HD Moore from Metasploit framework mailing list:
Simple search by BID:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoZtEjDMXBInYoHXs81IFPT0hHX0MrOPLqzsXjgAN0OC3v4AFuvlg5G7LLR7QEjmNmWCBgeY2qTLvQ4D5Q5MCVXqg6-YVRtcnLAiw4O8tgEdY8TkrC8W6yVdaNfCitWPDRxjuUy03tTiE/s320/Screen+shot+2011-06-22+at+1.08.05+PM.png)
And another using PLATFORM directive:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcNFy65mV2otsecQFhMPC_pz9JPYFC1OO3-cV-9jauNFp-pr_dTXAYardX0htiR5acXcavsZWE8TeBmvSmRiDOc4fBWW1qYnzOIEx2KejLQ4Y2yAMn8aBN4gROcu1DVHG3z-T3MalR6ok/s320/Screen+shot+2011-06-22+at+1.09.33+PM.png)
It may be not that perfect yet: but it works! :
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia7AVIZqDZ4tFeTAIZAk9qzGxHE_tthyJXTBEx1rTjuP9HZ19hkFw0srR9XMl4Tva2yrLcfi2rCmRYUc4n7uBTB_5el23-5fgs0FwXOysc6QmkK-eETL00XorYa98BbnWOZtRSN2VhI8w/s320/Screen+shot+2011-06-22+at+1.06.41+PM.png)
A very big kudos to HDM :)
//alak
The still-not-documented-keyword-system is much more flexible (and
slower), but takes the following options:
name Search within the module's descriptive name name:Microsoft
path Search within the module's path name path:windows/smb
platform Search for modules affecting this platform/target platform:linux
type Search for modules that are of a specific type (exploit,
auxiliary, or post) type:exploit
app Search for modules that are either client or server attacks app:client
author Search for modules written by author author:hdm
cve Search for modules with a matching CVE ID cve:2009
bid Search for modules with a matching Bugtraq ID bid:10078
osvdb Search for modules with a matching OSVDB ID osvdb:875
Simple search by BID:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoZtEjDMXBInYoHXs81IFPT0hHX0MrOPLqzsXjgAN0OC3v4AFuvlg5G7LLR7QEjmNmWCBgeY2qTLvQ4D5Q5MCVXqg6-YVRtcnLAiw4O8tgEdY8TkrC8W6yVdaNfCitWPDRxjuUy03tTiE/s320/Screen+shot+2011-06-22+at+1.08.05+PM.png)
And another using PLATFORM directive:
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcNFy65mV2otsecQFhMPC_pz9JPYFC1OO3-cV-9jauNFp-pr_dTXAYardX0htiR5acXcavsZWE8TeBmvSmRiDOc4fBWW1qYnzOIEx2KejLQ4Y2yAMn8aBN4gROcu1DVHG3z-T3MalR6ok/s320/Screen+shot+2011-06-22+at+1.09.33+PM.png)
It may be not that perfect yet: but it works! :
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia7AVIZqDZ4tFeTAIZAk9qzGxHE_tthyJXTBEx1rTjuP9HZ19hkFw0srR9XMl4Tva2yrLcfi2rCmRYUc4n7uBTB_5el23-5fgs0FwXOysc6QmkK-eETL00XorYa98BbnWOZtRSN2VhI8w/s320/Screen+shot+2011-06-22+at+1.06.41+PM.png)
A very big kudos to HDM :)
//alak
Comments
Post a Comment