what about connecting with mysql
What is the difference with armitage?
Am not trying to steal this thread. I am just learning metasploit from here:
My metasploit is updated as of today..
Can someone please help here. How can I please get connected to PostgreSQL? I did read this thread..and the suggestions in page 1:Code:=[ metasploit v4.3.0-release [core:4.3 api:1.0] + -- --=[ 839 exploits - 471 auxiliary - 142 post + -- --=[ 250 payloads - 27 encoders - 8 nops =[ svn r15202 updated today (2012.04.30) msf > db_driver [-] Unknown command: db_driver. msf >
"EDIT: everything works fine, it seems you just have to run it from the bin or the menu (wich is the same) and not from the perl doc." I could not quite follow it however.
Thanks all for the help.
the command db_driver in the latest versions of Metasploit has been "abandoned" and BT5-r2 if you NOT touched anything ,the connections to postgresql is "automatic" try the command: db_status
Can someone please help here. How can I please get connected to PostgreSQL? I did read this thread..and the suggestions in page 1:
Apologies for overlooking and thanks a lot for the help
I did exactly as you guide and loaded db_autopwn success.
But when I use "db_autopwn -e", there is a issue as following:
Error while running command db_autopwn: can't convert Fixnum into String
/opt/metasploit/msf3/plugins/db_autopwn.rb:190:in `block (3 levels) in cmd_db_autopwn'
/opt/metasploit/msf3/plugins/db_autopwn.rb:188:in `block (2 levels) in cmd_db_autopwn'
/opt/metasploit/msf3/lib/msf/core/module_manager.rb:243:in `block in each_module_list'
/opt/metasploit/msf3/plugins/db_autopwn.rb:184:in `block in cmd_db_autopwn'
/opt/metasploit/msf3/lib/rex/ui/text/dispatcher_shell.rb:342:in `block in run_single'
I am a newbie, so pls help me to fix this
You must have screwed up somewhere !! i suggest you repeat the process .
Here is my result:
msf > db_autopwn -e
[-] Warning: The db_autopwn command is not officially supported and exists only in a branch.
[-] This code is not well maintained, crashes systems, and crashes itself.
[-] Use only if you understand it's current limitations/issues.
[-] Minimal support and development via neinwechter on GitHub metasploit fork.
[-] [*] Usage: db_autopwn [options]
-h Display this help text
-t Show all matching exploit modules
-x Select modules based on vulnerability references
-p Select modules based on open ports
-e Launch exploits against all matched targets
-r Use a reverse connect shell
-b Use a bind shell on a random port (default)
-q Disable exploit module output
-R [rank] Only run modules with a minimal rank
-I [range] Only exploit hosts inside this range
-X [range] Always exclude hosts inside this range
-PI [range] Only exploit hosts with these ports open
-PX [range] Always exclude hosts with these ports open
-m [regex] Only run modules whose name matches the regex
-T [secs] Maximum runtime for any exploit in seconds
Ps: this might help: http://www.ruby-forum.com/topic/3762212#1049630
Last edited by ghostdog67; 05-31-2012 at 05:28 AM.
Thanks for your feedback, ghostdog67.