This really is a match made in heaven. F-Response is really slick from a remote…
Ryan Linn has started a project to bridge Nmap Scans all the way to exploitation using Metasploit.
Similar to the db_autopwn via fasttrack script (available in Backtrack 4), Nsploit does even more granular service level Nmap scanning to identify vulnerable software versions and map corresponding exploits. It then passes these to Metasploit and launches the pain at your target box.
It Uses Nmap’s NSE’s to trigger Metasploit commands via XMLRPC. Anything we can identify with an Nmap Script we can launch and get a shell… hopefully a meterpreter shell 😉
PDF slides here
Usage videos below: