Navigation
« Finding Domain Names from Discovery | Main | My Basic Setup on OSX Lion »
Friday
Sep092011

Extending Metasploit Resource Files

Today I saw an email on the Metasploit mailing list asking how one could scan hosts detected by other auxiliary modules and not scanned by Nmap so as to enumerate all services that might have been missed on this hosts. This gave me the excuse to play a bit with ruby inside resources files, something I have not done much of and came up with this little dab of ruby code that could be placed inside a resource file and used to scan al host. The script will actually check the notes for hosts that have any note with a type that starts with host.nmap and add the Host ID to an array, I use the uniq! method to remove any duplicates then go thru the entire list of host in the database and check if there ID is on the list of hosts already scanned by Nmap, if they are not then I run an Nmap scan against them. Do not know if you guys might find this useful but I will definitely keep it inside a resource file for those cases when I need to make sure I’m not missing anything in an internal assessment. Here is the code for it

Reader Comments (1)

hello sir, thanx for all the effort you have made. I do have question and i know that here in this post is not a place to ask but ....

sir , How do you encrypt the backdoor or msf file to evade antivirus? I know that metasploit has a shikataganai algorithm but in practical it is not working with today updated antivirus.
so can you direct us to what to do? any attack or backdoor attachment will be shutdown by the antivirus no matter how much or time you encrypt the backdoor trojan

once more I would like to say thank you for all the knowledge you have already shared
October 10, 2011 | Unregistered Commenterbabak

PostPost a New Comment

Enter your information below to add a new comment.
Author Email (optional):
Author URL (optional):
Post:
 
All HTML will be escaped. Hyperlinks will be created for URLs automatically.