lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed Jan 18 04:30:57 2006
From: greybrimstone at aim.com (greybrimstone@....com)
Subject: Vulnerability/Penetration Testing Tools

HD,
    Perfect! This is what I was looking for, much appreciated.

-Adriel

-----Original Message-----
From: H D Moore <fdlist@...italoffense.net>
To: full-disclosure@...ts.grok.org.uk
Sent: Tue, 17 Jan 2006 18:29:34 -0600
Subject: Re: [Full-disclosure] Vulnerability/Penetration Testing Tools

   Er, woops, misread - you want to scan and automatically exploit 
systems.
This can be easily done with a little scripting and the available
open-source tools. SensePost has a project called BiDiBLAH that
integrates Google-discovery, a TCP port scanner, Nessus, and Metasploit:
- http://www.sensepost.com/research/bidiblah/

The next version of the Metasploit Framework (v3) has support for 
'recon'
modules that technically you could use to automate this, but it will 
take
some time before this is usable.

-HD


On Tuesday 17 January 2006 18:04, H D Moore wrote:
> You should check out the Metasploit Framework:
>  - http://metasploit.com/projects/Framework/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


________________________________________________________________________
Check Out the new free AIM(R) Mail -- 2 GB of storage and 
industry-leading spam and email virus protection.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ