Results 1 to 10 of 10

Thread: Pentest Part one

Hybrid View

  1. #1
    Senior Member
    Join Date
    Jan 2010
    Posts
    173

    Default Pentest Part one

    Hi all its been a while,

    Heres a video of various uses to own a windows box
    Postgres-Nmap-Nessus-Metasploit-Autopwn-Sql_ping and so on...

    http://blip.tv/dgconsultinguk/pentest-part-1-5428603

    Regards dee

  2. #2
    Just burned his ISO
    Join Date
    Jun 2010
    Posts
    2

    Default Re: Pentest Part one

    good video for beginners like me ... thanks for sharing

  3. #3
    Senior Member
    Join Date
    Jan 2011
    Location
    over the under
    Posts
    197

    Default Re: Pentest Part one

    not bad, I liked the metasploit sql stuff. It reminded me of playing with metasploitable.

  4. #4
    Just burned his ISO
    Join Date
    Mar 2010
    Posts
    2

    Default Re: Pentest Part one

    Could have had more explanations

  5. #5
    Senior Member
    Join Date
    Jan 2010
    Posts
    173

    Default Re: Pentest Part one

    thanks all,

    I usually do caption and list all comms and why they are used but the video was rather long so left it out.

    Kind regards Dee

  6. #6
    Member
    Join Date
    Feb 2010
    Posts
    50

    Default Re: Pentest Part one

    can i see yr website Pentest09?

  7. #7
    Junior Member
    Join Date
    Jan 2010
    Posts
    29

    Default Re: Pentest Part one

    Great vid Pentest09, Mad skills in scripting after looking at your other projects.

  8. #8
    Just burned his ISO
    Join Date
    Sep 2011
    Posts
    8

    Default Re: Pentest Part one

    I would like to have a explaination on

    db_autopwn -e -t -r -x -p

    and also

    what is /etc/init.d/postgresql/ thing what is that?

    thank you

  9. #9
    Senior Member iproute's Avatar
    Join Date
    Jan 2010
    Location
    Midwest, USA
    Posts
    192

    Default Re: Pentest Part one

    Quote Originally Posted by xsixsi View Post
    I would like to have a explaination on

    db_autopwn -e -t -r -x -p

    and also

    what is /etc/init.d/postgresql/ thing what is that?

    thank you
    The /etc/init.d/postgresql/ is an init script... I havent seen the video but he probably uses it like this
    /etc/init.d/postgresql start
    which starts his postgresql database server

    db_autopwn is a metasploit command;

    msf > db_autopwn -h
    [*] Usage: db_autopwn [options]
    -h Display this help text
    -t Show all matching exploit modules
    -x Select modules based on vulnerability references
    -p Select modules based on open ports
    -e Launch exploits against all matched targets
    -r Use a reverse connect shell
    -b Use a bind shell on a random port (default)
    -q Disable exploit module output
    -R [rank] Only run modules with a minimal rank
    -I [range] Only exploit hosts inside this range
    -X [range] Always exclude hosts inside this range
    -PI [range] Only exploit hosts with these ports open
    -PX [range] Always exclude hosts with these ports open
    -m [regex] Only run modules whose name matches the regex
    -T [secs] Maximum runtime for any exploit in seconds

    Bear in mind these are options reflected from an older 3.X whatever version of MSF from backtrack4r2. I just pulled it from my old tutorial from the BT4 forum section

  10. #10
    Just burned his ISO
    Join Date
    Sep 2011
    Posts
    8

    Default Re: Pentest Part one

    Quote Originally Posted by iproute View Post
    The /etc/init.d/postgresql/ is an init script... I havent seen the video but he probably uses it like this
    /etc/init.d/postgresql start
    which starts his postgresql database server

    db_autopwn is a metasploit command;

    msf > db_autopwn -h
    [*] Usage: db_autopwn [options]
    -h Display this help text
    -t Show all matching exploit modules
    -x Select modules based on vulnerability references
    -p Select modules based on open ports
    -e Launch exploits against all matched targets
    -r Use a reverse connect shell
    -b Use a bind shell on a random port (default)
    -q Disable exploit module output
    -R [rank] Only run modules with a minimal rank
    -I [range] Only exploit hosts inside this range
    -X [range] Always exclude hosts inside this range
    -PI [range] Only exploit hosts with these ports open
    -PX [range] Always exclude hosts with these ports open
    -m [regex] Only run modules whose name matches the regex
    -T [secs] Maximum runtime for any exploit in seconds

    Bear in mind these are options reflected from an older 3.X whatever version of MSF from backtrack4r2. I just pulled it from my old tutorial from the BT4 forum section
    Thank you a lot for the info.
    so I will not use postgresgl?. because I am on BT5 and I think I have got Metasploit 4.0

Similar Threads

  1. Installing BT3 on the eee 901 with drivers, part I
    By hippocrates in forum OLD Tutorials and Guides
    Replies: 45
    Last Post: 11-02-2009, 01:04 PM
  2. Knowing part of the key
    By new2bt3 in forum OLD Wireless
    Replies: 10
    Last Post: 05-31-2009, 09:09 AM
  3. Scapy Tutorial - Part 1 - ARP
    By pepsidrinker in forum OLD Newbie Area
    Replies: 2
    Last Post: 01-15-2009, 03:33 PM
  4. C for Beginners : Part 3 : Portability
    By Virchanza in forum OLD Programming
    Replies: 10
    Last Post: 12-10-2008, 12:07 AM
  5. BT3 USB Part 2
    By Crazy8 in forum OLD BT3beta General
    Replies: 4
    Last Post: 01-16-2008, 06:53 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •