I've been playing around for the last few hours trying to get this working.
I've read many forum posts on different forums, but I still haven't got it working.
It doesn't help that all of the Fast-track websites are down, both "Secure State" and "The Pen Test".
I've done all sorts of weird stuff like create a user called "postgres", and I can't count many ruby libraries I've installed.
Here's some of the guides I've followed:
Automate Your Pen Testing with Fast-Track and Linux - www.enterprisenetworkingplanet.com
The Bored IT Guy » How to install Fast-Track 4.0 on Ubuntu
[ubuntu] How to: metasploit with autopwn [Archive] - Ubuntu Forums
Here's the versions I'm working with:
When I run Fast-track, it tests for dependencies and everything comes back OK except for pymills. I searched the web for pymills and it seems to have disappeared into a black hole, seems like the Russians came and kidnapped the developers.
If I do:
Enter 2 for Autopwn.Code:python fast-track.py -i
Enter the IP address.
Enter 2 for Reverse Binding.
Then it loads Metasploit but here's what I get, check out the errors in red:
Anyone got any ideas?Code:msf > db_destroy pentest dropdb: could not connect to database postgres: FATAL: Ident authentication failed for user "root" msf > db_create pentest createdb: could not connect to database postgres: FATAL: Ident authentication failed for user "postgres" [-] Error while running command db_create: Failed to connect to the database: FATAL: Ident authentication failed for user "postgres" Call stack: /root/metasploit/lib/msf/ui/console/command_dispatcher/db.rb:1552:in `db_create_postgresql' /root/metasploit/lib/msf/ui/console/command_dispatcher/db.rb:1078:in `send' /root/metasploit/lib/msf/ui/console/command_dispatcher/db.rb:1078:in `cmd_db_create' /root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:239:in `send' /root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:239:in `run_command' /root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:201:in `run_single' /root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:195:in `each' /root/metasploit/lib/rex/ui/text/dispatcher_shell.rb:195:in `run_single' /root/metasploit/lib/rex/ui/text/shell.rb:144:in `run' /root/metasploit/msfconsole:93 msf > db_nmap 192.168.1.111 [-] Unknown command: db_nmap. msf > db_autopwn -p -t -e -r [-] Unknown command: db_autopwn. msf > sleep 5 msf > jobs -K Stopping all jobs...