Metasploit mailing list archives
error with db_autopwn
From: tim.e.mcguire at gmail.com (Timothy McGuire)
Date: Thu, 7 Jun 2007 15:38:32 -0500
Hello, I am trying to run db_autopwn against a vmware instance of Damn Vulnerable Linux. I've studied the instructions at http://blog.metasploit.com/2006/09/metasploit-30-automated-exploitation.html I didn't follow the install steps there because the required parts seem to be in my Windows install. I have a database named metasploit2 populated by the postgres.sql script that came with the metasploit framework Here is what I am doing: load db_postgres db_connect superuser:superpassword at 127.0.0.1:5432/metasploit2 db_nmap -v -A 192.168.226.129 (this populates my services table with interesting ports)
db_services
[*] Service: host=192.168.226.129 port=22 proto=tcp state=up name=ssh [*] Service: host=192.168.226.129 port=80 proto=tcp state=up name=http [*] Service: host=192.168.226.129 port=631 proto=tcp state=up name=ipp [*] Service: host=192.168.226.129 port=3306 proto=tcp state=up name=mysql [*] Service: host=192.168.226.129 port=6000 proto=tcp state=up name=X11 db_autopwn -t -p and result is: [-] Error while running command db_autopwn: undefined method `type_oid' for nil:NilClass Call stack: C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/postgres- pr-0.4.0/lib/postgres-pr/postgres-compat.rb:93:in `type' C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord- 1.15.2/lib/active_record/connection_adapters/postgresql_adapter.rb:443:in `select' C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord- 1.15.2/lib/active_record/connection_adapters/postgresql_adapter.rb:440:in `each_index' C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord- 1.15.2/lib/active_record/connection_adapters/postgresql_adapter.rb:440:in `select' C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord- 1.15.2/lib/active_record/connection_adapters/postgresql_adapter.rb:438:in `each' C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord- 1.15.2/lib/active_record/connection_adapters/postgresql_adapter.rb:438:in `select' C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord- 1.15.2/lib/active_record/connection_adapters/abstract/database_statements.rb:7:in `select_all' C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord-1.15.2/lib/active_record/base.rb:427:in `find_by_sql' C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord- 1.15.2/lib/active_record/base.rb:997:in `find_every' C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord- 1.15.2/lib/active_record/base.rb:991:in `find_initial' C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord- 1.15.2/lib/active_record/base.rb:417:in `find' etc.... So, any hints would help. I don't see any exploits that would specifically match any vulnerabilities I have in the target, so I don't expect the command to compromise the system, but I'd like to know what the errors mean. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070607/b8ed4732/attachment.htm>
Current thread:
- error with db_autopwn Timothy McGuire (Jun 07)