For those of you following along at home who like this script, I've replaced the ping with:
And the appropriate strstr() to check for the 302 has-moved code. It actually stands a better chance of getting out (especially when, if you need to, you can wrap it in proxyconnect like I frequently have to do).Code:system("perl -e 'print qq|GET / HTTP/1.0\n\n|;' | nc www.google.com 80")
Other than that, good stuff sickness, look forward to further updates and more advanced features.
Still not underestimating the power...
There is no such thing as bad information - There is truth in the data, so you sift it all, even the crap stuff.
even if you try to update exploitdb manually it seems to hang, at least on my end. I don't believe that particular problem has anything to do with this script.
EDIT:Code:[>] Checking for internet connectivity please wait! [>] Internet is working! +-++-++-++-++-++-++-++-++-+ +-+ +-++-++-++-++-++-+ |B||a||c||k||t||r||a||c||k| |5| |u||p||d||a||t||e| +-++-++-++-++-++-++-++-++-+ +-+ +-++-++-++-++-++-+ Author: sickness Version: 0.1 Feedback/Bugs: firstname.lastname@example.org Blog: http://sickness.tor.hu Section: EXPLOIT TOOLS [>] 1. Metasploit Framework. [>] 2. Exploit-db. [>] 3. SET - Social Engineering Toolkit. [>] 4. Update all. [>] 5. Back. [>] Enter your choice: 2 [>] Updating Exploit-db, please wait. At revision 28. [>] Exploit-db updated successfully!
Upgrade the script to version 0.3, fixed some minor issues, and included the solution Gitsnik suggested also.
Great script; I got around ping filtering by removing the "check internet" feature.
Note: the KDE 32 repo upgrade to MSF is presently broken. See: http://www.backtrack-linux.org/forum...asploit-2.html
Take note that the script may thus break MSF3.
thats strange I keep getting the same error as them and I'm doing it by "/pentest/exploits/exploitdb/platforms# svn up"
I have these errors:
and thisCode:[>] Enter your choice: 1 [>] Updating Aircrack-NG and Airodump, please wait. sh: line 0: cd: /pentest/wireless/aircrack-ng/: No such file or directory [>] Failed to update Aircrack-ng.
Thanks again sicknessCode:[>] Updating Sqlmap, please wait. U lib/utils/hash.py Authentication realm: <https://svn.sqlmap.org:443> Authentication required Password for 'root': Authentication realm: <https://svn.sqlmap.org:443> Authentication required Username: ^Csvn: OPTIONS of 'https://svn.sqlmap.org/sqlmap': authorization failed: Could not authenticate to server: rejected Digest challenge (https://svn.sqlmap.org) [>] Failed to update SQLmap.
I am using backtrack5 gnome 32bit on vmware workstation 7.1.4
I am experiencing an issue with the script. I have ran the option 1. then i went to run option 2 then went to update all. I got the following error:
<pre class="bbcode_code"style="height:144px;">sh: line 0: cd: /pentest/exploits/framework3/: No such file or directory
[>] Failed to update Metasploit.</pre>
I checked the directory /pentest/exploits/framework3/ the link was broken
So i check /opt/framework3/ and the msf3 folder was missing?
Does anyone know how to correct this issue? I would greatly appreciate the help