\hypertarget{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit}{
\section{MetaSploit Class Reference}
\label{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit}\index{pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}}
}
Inheritance diagram for MetaSploit:\subsection*{Public Member Functions}
\begin{CompactItemize}
\item 
def \hyperlink{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_c775ee34451fdfa742b318538164070e}{\_\-\_\-init\_\-\_\-}
\item 
def \hyperlink{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_fa251912978c7d5ccf7e5a027a4d12ee}{\_\-\_\-del\_\-\_\-}
\item 
def \hyperlink{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_f1614f1d536ad358da81856c70a802a5}{showMatchingExploits}
\item 
def \hyperlink{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_866829455cdbdcca665757023c1194f0}{exploit}
\item 
def \hyperlink{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_e489a30c99200510181b710b842ba4a0}{listsessions}
\item 
def \hyperlink{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_bf10c49d72b528be111ca6c57f2a8f0f}{scan}
\item 
def \hyperlink{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_a096632ab9c59d0a861faf77b3ab6ce3}{loadPlugins}
\end{CompactItemize}


\subsection{Detailed Description}


\footnotesize\begin{verbatim}
Base class containing methods responsible for communication with Metasploit Framework
\end{verbatim}
\normalsize
 

Definition at line 34 of file metasploit.py.

\subsection{Member Function Documentation}
\hypertarget{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_c775ee34451fdfa742b318538164070e}{
\index{pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}!\_\-\_\-init\_\-\_\-@{\_\-\_\-init\_\-\_\-}}
\index{\_\-\_\-init\_\-\_\-@{\_\-\_\-init\_\-\_\-}!pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}}
\subsubsection[\_\-\_\-init\_\-\_\-]{\setlength{\rightskip}{0pt plus 5cm}def \_\-\_\-init\_\-\_\- ( {\em self})}}
\label{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_c775ee34451fdfa742b318538164070e}




\footnotesize\begin{verbatim}
Default constructor for the Metasploit base class is (abstract) empty.
\end{verbatim}
\normalsize
 

Definition at line 38 of file metasploit.py.\hypertarget{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_fa251912978c7d5ccf7e5a027a4d12ee}{
\index{pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}!\_\-\_\-del\_\-\_\-@{\_\-\_\-del\_\-\_\-}}
\index{\_\-\_\-del\_\-\_\-@{\_\-\_\-del\_\-\_\-}!pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}}
\subsubsection[\_\-\_\-del\_\-\_\-]{\setlength{\rightskip}{0pt plus 5cm}def \_\-\_\-del\_\-\_\- ( {\em self})}}
\label{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_fa251912978c7d5ccf7e5a027a4d12ee}




\footnotesize\begin{verbatim}
Destructor for MetaSploit class. Kills the child process spawned
by our program. In most cases it is a telnet process or localy running
MetaSploit Framework\end{verbatim}
\normalsize
 

Definition at line 43 of file metasploit.py.\hypertarget{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_f1614f1d536ad358da81856c70a802a5}{
\index{pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}!showMatchingExploits@{showMatchingExploits}}
\index{showMatchingExploits@{showMatchingExploits}!pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}}
\subsubsection[showMatchingExploits]{\setlength{\rightskip}{0pt plus 5cm}def showMatchingExploits ( {\em self})}}
\label{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_f1614f1d536ad358da81856c70a802a5}




\footnotesize\begin{verbatim}
Performs matching of available MetaSploit exploits with relation to
services information in the database. Matching is based on IP 
destination ports of a particular services and information
provided by authors of MetaSploit exploits. 
\end{verbatim}
\normalsize
 

Definition at line 52 of file metasploit.py.\hypertarget{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_866829455cdbdcca665757023c1194f0}{
\index{pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}!exploit@{exploit}}
\index{exploit@{exploit}!pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}}
\subsubsection[exploit]{\setlength{\rightskip}{0pt plus 5cm}def exploit ( {\em self}, \/   {\em include} = {\tt None}, \/   {\em exclude} = {\tt None})}}
\label{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_866829455cdbdcca665757023c1194f0}




\footnotesize\begin{verbatim}
Starts exploiting of every service and every host existing
in database. Optionally you can specify exclusion or/and inclusion,
by passing particular network ranges as the "include" or "exclude" parameter.
Example:
MetaSploit.exploit(include="172.30.31.0/24")
 or 
MetaSploit.exploit(include="10.0.0.1-10.0.0.50")

"exclude" parameter syntax is same as for "include" one.
\end{verbatim}
\normalsize
 

Definition at line 76 of file metasploit.py.\hypertarget{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_e489a30c99200510181b710b842ba4a0}{
\index{pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}!listsessions@{listsessions}}
\index{listsessions@{listsessions}!pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}}
\subsubsection[listsessions]{\setlength{\rightskip}{0pt plus 5cm}def listsessions ( {\em self})}}
\label{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_e489a30c99200510181b710b842ba4a0}




\footnotesize\begin{verbatim}Lists currently connected telnet sessions to the exploited hosts.
   Returns list of string containing raw output from MetaSploit.\end{verbatim}
\normalsize
 

Definition at line 117 of file metasploit.py.\hypertarget{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_bf10c49d72b528be111ca6c57f2a8f0f}{
\index{pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}!scan@{scan}}
\index{scan@{scan}!pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}}
\subsubsection[scan]{\setlength{\rightskip}{0pt plus 5cm}def scan ( {\em self}, \/   {\em network})}}
\label{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_bf10c49d72b528be111ca6c57f2a8f0f}




\footnotesize\begin{verbatim}
Runs scan for services on specified network. This command spawns
nmap port scanner through MetaSploit framework. Notice that, if you
want to run scan on remote framework, nmap installation on remote 
host (running MSF) is required.
\end{verbatim}
\normalsize
 

Definition at line 129 of file metasploit.py.\hypertarget{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_a096632ab9c59d0a861faf77b3ab6ce3}{
\index{pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}!loadPlugins@{loadPlugins}}
\index{loadPlugins@{loadPlugins}!pentester::hosts::metasploit::MetaSploit@{pentester::hosts::metasploit::MetaSploit}}
\subsubsection[loadPlugins]{\setlength{\rightskip}{0pt plus 5cm}def loadPlugins ( {\em self}, \/   {\em login}, \/   {\em password}, \/   {\em dbname}, \/   {\em hostname}, \/   {\em port})}}
\label{classpentester_1_1hosts_1_1metasploit_1_1MetaSploit_a096632ab9c59d0a861faf77b3ab6ce3}




\footnotesize\begin{verbatim}
Loads all required framework modules. Currently used to load PostgreSQL backend
module, then make connection to database using credentials passed to the connect() method.
\end{verbatim}
\normalsize
 

Definition at line 146 of file metasploit.py.

The documentation for this class was generated from the following file:\begin{CompactItemize}
\item 
\hyperlink{metasploit_8py}{metasploit.py}\end{CompactItemize}
