MSF from the moment of its release is THE most powerful offensive tool in a pentesters arsenal. In this tutorial i plan to show how to use autopwn feature of MSF from scanning to getting a meterpreter shell.
Lets boot up trusty ol BT4 R1. Bring up your favourite terminal emulator.
We'll use msf console because its much less cluttered than GUI.
wait a few minutes for MSF to load all modules and exploits.
Now that we have the msfconsole up and running we need to select a database driver to store info about our target..i prefer sqlite3 cause it doesnt need any further setup for me
now we need to create a new database to store the info
feel free to replace autopwn with any name
we are connected to the database.
Run a simple nmap scan to enumerate the host
to see host information
AND finally for the actual autopwn jst run
and there you have it...if an exploit worked you'll have a session...
db_autopwn -p -t -e
if you dont well better luck next time