New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add analyze command #11191
add analyze command #11191
Conversation
An RPC API for this would also be great, so automation tools can get this data from Metasploit too. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Awesome stuff, thank you.
@bcook, took a stab at RPC support (needs thorough testing), I did couple the method into rpc_db for now to match with the requirement for a db on the command dispatcher side. If you think that is a poor location or we should support a better location to avoid breaking API change later happy to reconsider. I suspect |
I'm seeing an error when attempting to use the RPC method ~/.msf4/logs/framework.log:
|
Consider having the
|
c6d8e17
to
6460180
Compare
Updated documentation on all db rpc methods that did not specify when workspace was needed. Corrected call format is: Also expanded console dispatcher to report on all hosts when no single ip or range is provided. |
Minor: |
In addition to the import, I ran
|
Release NotesThis adds the |
This is the initial start on an idea of enabling the framework to suggest modules base on what a user has already learned and stored about a host. Currently functionality is limited to linking vulnerabilities already stored about a host to exploit modules that may take advantage of that vulnerability.
For now this enables the
analyze
command only when a user has a database attached to the console.Example usage against metasploitable3 based on a vulnerability scan imported from nexpose:
Looking Forward
At some point things like the
Multi Recon Local Exploit Suggester
module could be integrated into a single location to get hints from metasploit framework about next steps a user may consider taking.Anyone taking a gander at this please provide input on the user experience and how the initial functionality could be tweaked before this lands.
Verification
List the steps needed to make sure this thing works
msfconsole
db_import <test_file_path>.xml
m3_report.xml.zip