KvasirSecurity / Kvasir

Kvasir: Penetration Test Data Management
Other
426 stars 85 forks source link

Process Metasploit Exploits output #154

Open grutz opened 9 years ago

grutz commented 9 years ago

A list of exploits and references can be generated using tools/module_reference.rb:

$ tools/module_reference.rb -h

Metasploit Script for Displaying Module Reference information.
==========================================================

OPTIONS:

    -c        Check reference status
    -f <opt>  Filter based on Module Type [All,Exploit,Payload,Post,NOP,Encoder,Auxiliary] (Default = ALL).
    -h        Help menu.
    -o <opt>  Save the results to a file
    -r        Reverse Sort
    -s        Sort by Reference instead of Module Type.
    -t <opt>  Type of Reference to sort by ["ALL", "OSVDB", "CVE", "CWE", "BID", "MSB", "EDB", "US-CERT-VU", "ZDI", "WPVDB", "URL"]
    -x <opt>  String or RegEx to try and match against the Reference Field

Kvasir should parse the result and anything with a CVE should be added to the t_exploits table. If a valid MSFRPC instance module.info should be called to get more details but this is a separate function yet to be written.