Page 4 of 7 FirstFirst ... 23456 ... LastLast
Results 31 to 40 of 64

Thread: Fast-Track Dev

  1. #31
    Member
    Join Date
    Feb 2006
    Posts
    167

    Default hmmm

    Did you re-download it? Works fine for me on BackTrack v2 now....not getting a db sqlite3 message.

  2. #32
    Member imported_rokrmc's Avatar
    Join Date
    Aug 2007
    Posts
    155

    Default

    Yes but still have same problem.......

  3. #33
    Senior Member PrairieFire's Avatar
    Join Date
    Apr 2007
    Posts
    705

    Default

    Quote Originally Posted by relik View Post
    Did you re-download it? Works fine for me on BackTrack v2 now....not getting a db sqlite3 message.
    I receive a similar error video.

    Using ssh to a unaltered vmware image of BT2Final.iso
    Μολὼν λαβέ - Great spirits encounter heavy opposition from mediocre minds.

  4. #34
    Developer
    Join Date
    Mar 2007
    Posts
    6,126

    Default

    Interesting ports on 192.168.1.1:
    Not shown: 1696 filtered ports
    PORT STATE SERVICE
    53/tcp closed domain
    MAC Address: 00:14:6C:F6:36:78 (Netgear)

    All 1697 scanned ports on 192.168.1.2 are filtered
    MAC Address: 00:0C:F1:A8:61B (Intel)

    All 1697 scanned ports on 192.168.1.3 are filtered
    MAC Address: 00:10:C6:44:99:8E (USI)

    Interesting ports on 192.168.1.5:
    Not shown: 1694 closed ports
    PORT STATE SERVICE
    22/tcp open ssh
    631/tcp open ipp
    6000/tcp open X11

    Nmap finished: 256 IP addresses (4 hosts up) scanned in 55.881 seconds
    [-] Error while running command db_nmap: no such file to load -- sqlite3
    msf >
    I have a similar output

  5. #35
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default Solution

    here is the solution .... maybe Rel1k can include this into his script (if i can help or build a gui .... just pm)

    FIRST THING BEFORE STARTING FAST TRACK

    start-db_autopwn
    sudo -s postgres


    fastrack-0.4.py

    fasttrack update

    update all stuff for sql & autopawn

    EXTERNAL HACKING / AUTOPAWN.........

    IPS

    type postgres for database

    and it roxxxxxxxxxxxxx

    THX A LOT RELIK, BTW THREAD TITLE CHANGED........ THREAD MOVED TO APPROPRIATE CORNER............
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  6. #36
    Senior Member PrairieFire's Avatar
    Join Date
    Apr 2007
    Posts
    705

    Default

    Quote Originally Posted by shamanvirtuel View Post
    sudo -s postgres
    Code:
    bt ~ #sudo -s postgres
    /usr/local/pgsql/bin/postgres: /usr/local/pgsql/bin/postgres: cannot execute binary file
    bt ~ #
    Noticed you cannot exit from:

    2. External Hackin -> 3. Autopwn Metasploit Automated -> (ip range) -> (database)
    msf> exit
    Enter ip ranges to autopwn:
    Μολὼν λαβέ - Great spirits encounter heavy opposition from mediocre minds.

  7. #37
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Smile

    yep sorry ;;;;

    this works ......

    i know rel1k says to run as root ... but ......
    the 'root role' for psql don't exists..............

    you need to run psql as postgres user

    the pb is when you trying that...... pgsql is not here ... missing path .... so

    under postgres account we add it

    Code:
    bt root $ su postgres
    bt root $ PATH=$(echo $PATH':/usr/local/pgsql/bin')
    bt root $ start-db_autopwn
    [**************************************************************][*] Postgres should be setup now. To run db_autopwn, please:[*] # su - postgres[*] # cd /pentest/exploits/framework3
    {*] # ./msfconsole[*] msf> load db_postgres
    [**************************************************************]
    bt root $ sudo -u postgres postgres
    bt root $ whoami
    postgres
    bt root $ cd Desktop
    bt Desktop $ ./fast-trackv0.4.py
    
    
    Back|Track v3.0 http://www.remote-exploit.com
    
    Fast|Track version 0.1 Beta
    
    Please report bugs to the below address:
    
    Written by: David Kennedy,
                Handle:ReL1K
                Company: SecureState
                IRC: freenode and Astalavista
    
    Be sure to check out the Help/Creds for more information and
    shout-outs.
    
    If you want to use the sql functions, make sure you install
    FreeTDS and PYMSSQL from the Updates menu.
    
    MAKE SURE YOU RUN THIS AS ROOT!!!
    
    DISCLAIMER: This is only for testing purposes and can only be
    used where strict consent has been given. Do not use this for
    illegal purposes period.
    
    
    Fast|Track Main Menu:
    
        1. Fast|Track Updates
        2. External Hackin
        3. Internal Hackin
        4. BackTrack Server Services (SSH, VNC, etc)
        5. Help/Creds
        6. Exit
    
        Enter the number: 2
    
    External Pentesting Menu:
    
           1. Port Scanning
           2. Exploitation (Metasploit)
           3. Autopwn Metasploit Automated (requires pexpect from main menu)
           4. Return to Previous Menu
    
           Enter a number: 3
    
    Metasploit Autopwn Automation
    
    Simple, enter the IP ranges like you would in NMap i.e. 192.168.1.-254 or 192.16
    8.1.1/24
    or whatever you want and it'll run against those hosts. When it has completed ex
    ploiting
    simply type this:
    
    sessions -l (lists the shells spawned)
    sessions -i <id> (jumps you into the sessions)
    
    
    Enter the ip ranges to autopwn: 192.168.1.1
    
    
    What database are you using? BackTrack uses postgres, others prefer sqlite3. If
    your
    using BackTrack by default, just type postgres, if not type sqlite3
    
    Choice postgres or sqlite3: postgres
    Port scanning hosts...
    Attacking hosts...be patient...
    None
    load db_postgres
    db_create pentest
    db_nmap 192.168.1.1
    db_autopwn -p -t -e
    
                     o                       8         o   o
                     8                       8             8
    ooYoYo. .oPYo.  o8P .oPYo. .oPYo. .oPYo. 8 .oPYo. o8  o8P
    8' 8  8 8oooo8   8  .oooo8 Yb..   8    8 8 8    8  8   8
    8  8  8 8.       8  8    8   'Yb. 8    8 8 8    8  8   8
    8  8  8 `Yooo'   8  `YooP8 `YooP' 8YooP' 8 `YooP'  8   8
    ..:..:..:.....:::..::.....::.....:8.....:..:.....::..::..:
    ::::::::::::::::::::::::::::::::::8:::::::::::::::::::::::
    ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
    
    
           =[ msf v3.1-dev
    + -- --=[ 247 exploits - 116 payloads
    + -- --=[ 17 encoders - 6 nops
           =[ 43 aux
    
    msf > load db_postgres[*] Successfully loaded plugin: db_postgres
    msf > db_create pentest
    CREATE DATABASE
    ERROR:  table "hosts" does not exist
    NOTICE:  CREATE TABLE will create implicit sequence "hosts_id_seq" for serial co
    lumn "hosts.id"
    NOTICE:  CREATE TABLE / PRIMARY KEY will create implicit index "hosts_pkey" for
    table "hosts"
    NOTICE:  CREATE TABLE / UNIQUE will create implicit index "hosts_address_key" fo
    r table "hosts"
    ERROR:  table "services" does not exist
    NOTICE:  CREATE TABLE will create implicit sequence "services_id_seq" for serial
     column "services.id"
    NOTICE:  CREATE TABLE / PRIMARY KEY will create implicit index "services_pkey" f
    or table "services"
    ERROR:  table "vulns" does not exist
    NOTICE:  CREATE TABLE will create implicit sequence "vulns_id_seq" for serial co
    lumn "vulns.id"
    NOTICE:  CREATE TABLE / PRIMARY KEY will create implicit index "vulns_pkey" for
    table "vulns"
    ERROR:  table "refs" does not exist
    NOTICE:  CREATE TABLE will create implicit sequence "refs_id_seq" for serial col
    umn "refs.id"
    NOTICE:  CREATE TABLE / PRIMARY KEY will create implicit index "refs_pkey" for t
    able "refs"
    ERROR:  table "vulns_refs" does not exist[*] Database creation complete (check for errors)
    msf > db_nmap 192.168.1.1
    
    Starting Nmap 4.20 ( http://insecure.org ) at 2007-10-28 08:22 GMT
    Interesting ports on 192.168.1.1:
    Not shown: 1694 closed ports
    PORT   STATE    SERVICE
    21/tcp filtered ftp
    23/tcp open     telnet
    80/tcp open     http
    
    Nmap finished: 1 IP address (1 host up) scanned in 12.767 seconds
    msf > db_autopwn -p -t -e[*] Analysis completed in 30.0178060531616 seconds (0 vulns / 0 refs)[*] Matched exploit/windows/http/badblue_ext_overflow against 192.168.1.1:80... [*] Launching exploit/windows/http/badblue_ext_overflow (1/42) against 192.168.1.1:80... [*] Started bind handler [*] Matched exploit/windows/isapi/w3who_query against 192.168.1.1:80...[*] Trying target BadBlue 2.5 (Universal)...[*] Matched exploit/solaris/telnet/fuser against 192.168.1.1:23...[*] Launching exploit/solaris/telnet/fuser (3/42) against 192.168.1.1:23...[*] Started bind handler
    .....
    ......
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  8. #38
    Member
    Join Date
    Feb 2006
    Posts
    167

    Default makes sense

    Will incorporate this into the script so you don't have to type this... Should be able to knock it out before Tuesday, I don't do things on the weekend

  9. #39
    Member imported_rokrmc's Avatar
    Join Date
    Aug 2007
    Posts
    155

    Default

    Finally, I solve the problem........thanks relix for a great tool......

    Code:
    bt ~ # ./fast-trackv0.4.py
    
    
    Back|Track v3.0 http://www.remote-exploit.com
    
    Fast|Track version 0.1 Beta
    
    Please report bugs to the below address:
    
    Written by: David Kennedy,
                Handle:ReL1K
                Company: SecureState
                IRC: freenode and Astalavista
    
    Be sure to check out the Help/Creds for more information and
    shout-outs.
    
    If you want to use the sql functions, make sure you install
    FreeTDS and PYMSSQL from the Updates menu.
    
    MAKE SURE YOU RUN THIS AS ROOT!!!
    
    DISCLAIMER: This is only for testing purposes and can only be
    used where strict consent has been given. Do not use this for
    illegal purposes period.
    
    
    Fast|Track Main Menu:
    
        1. Fast|Track Updates
        2. External Hackin
        3. Internal Hackin
        4. BackTrack Server Services (SSH, VNC, etc)
        5. Help/Creds
        6. Exit
    
        Enter the number: 2
    
    External Pentesting Menu:
    
           1. Port Scanning
           2. Exploitation (Metasploit)
           3. Autopwn Metasploit Automated (requires pexpect from main menu)
           4. Return to Previous Menu
    
           Enter a number: 2
    What do you want to launch, the MSF console or MSFWeb Interfaces?
    
    Enter 1 for console 2 for web: 1
    Launching MSFConsole
    
     ____________
    < metasploit >
     ------------
           \   ,__,
            \  (oo)____
               (__)    )\
                  ||--|| *
    
    
           =[ msf v3.1-dev
    + -- --=[ 248 exploits - 116 payloads
    + -- --=[ 17 encoders - 6 nops
           =[ 43 aux
    
    msf > load db_sqlite3[*] Successfully loaded plugin: db_sqlite3
    msf > db_create pentest[*] Creating a new database instance...
    CREATE TABLE hosts (
    'id' INTEGER PRIMARY KEY NOT NULL,
    'address' VARCHAR(16) UNIQUE,
    'comm' VARCHAR(255),
    'name' VARCHAR(255),
    'state' VARCHAR(255),
    'desc' VARCHAR(1024)
    );
    CREATE TABLE refs (
    'id' INTEGER PRIMARY KEY NOT NULL,
    'ref_id' INTEGER,
    'name' VARCHAR(512)
    );
    CREATE TABLE services (
    'id' INTEGER PRIMARY KEY NOT NULL,
    'host_id' INTEGER,
    'port' INTEGER NOT NULL,
    'proto' VARCHAR(16) NOT NULL,
    'state' VARCHAR(255),
    'name' VARCHAR(255),
    'desc' VARCHAR(1024)
    );
    CREATE TABLE vulns (
    'id' INTEGER PRIMARY KEY NOT NULL,
    'service_id' INTEGER,
    'name' VARCHAR(1024),
    'data' TEXT
    );
    CREATE TABLE vulns_refs (
    'ref_id' INTEGER,
    'vuln_id' INTEGER
    );
    msf > db_nmap 192.168.1.105
    
    Starting Nmap 4.20 ( http://insecure.org ) at 2007-10-29 19:38 GMT
    Interesting ports on 192.168.1.105:
    Not shown: 1695 closed ports
    PORT     STATE SERVICE
    631/tcp  open  ipp
    6000/tcp open  X11
    
    Nmap finished: 1 IP address (1 host up) scanned in 9.291 seconds
    msf > db_autopwn -t -p -e[*] Analysis completed in 13.9838120937347 seconds (0 vulns / 0 refs)
    msf >

  10. #40
    Member
    Join Date
    Feb 2006
    Posts
    167

    Default fixes

    Alright guys, reuploaded a newer version, I scrapped trying to fix the postgres stuff and just appended a howto if you want to use postgres. I added a menu in the Fast|Track updates page that installs the latest version of sqlite3 and the ruby addons to work within metasploit. Just by typing 9, it installs it, and just type sqlite3 in the autopwn automation menu and your good to go on BackTrack 2.

    I removed all the Ubuntu stuff, since this is getting customized specifically for BackTrack.

    http://www.securestate.com/files/fas...t-trackv0.5.py

Page 4 of 7 FirstFirst ... 23456 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •