After updating metasploit, fast-track does not work due to the removal of db_autopwn from the metasploit framework. This is easily fixed by first grabbing db_autopwn which you can do in this thread: http://www.backtrack-linux.org/forum...ad.php?t=48407

After you have db_autopwn, we just need to add two lines to fast-track's autopwn.py script.

Navigate (command line or file manger) to: /pentest/exploits/fasttrack/bin/ftsrc

Using your favourite text editor open autopwn.py and find the following lines(roughly line 84):

Code:
child1 = pexpect.spawn('msfconsole')
Add a blank line below it and then add the following:

Code:
# load autopwn
   child1.sendline ('load db_autopwn')
The block should look something like this when finished:
Code:
try:
   child1 = pexpect.spawn('msfconsole')
# load autopwn
   child1.sendline ('load db_autopwn')
# load sqlite3
   child1.sendline ('db_driver postgresql')
# run actual port scans
   child1.sendline ('''db_nmap %s ''' % (ipaddr))
Save the file, and now fast-track's autopwn feature should be fully working again.


-devx