Metasploit mailing list archives

Metasploit on Windows (TEST2)


From: jeffs at speakeasy.net (Jeffs)
Date: Thu, 03 Jan 2008 22:37:08 -0500

Works great!

Question:
after running an autopwn session the IP number for that session remains 
in the database -- on subsequent autopwn sessions that IP now gets 
interrogated and attacked even though I don't want that to happen.  How 
do you remove data from the database so you can start a fresh autopwn 
session?

thanks

H D Moore wrote:
I just uploaded a new version of the Windows installer. This version can 
be obtained from the following URL:

https://metasploit.com/metasploit-3.1-win32-TEST2.exe
MD5: 26d110df1c901ef7fea2edb3516eb6e6

Major changes from the TEST1 installer:
 * Includes the Nmap 4.50 installer (with permission from Fyador)
 * Builtin support for db_sqlite3 / db_nmap / db_autopwn
 * The configuration directory is now %LOCALAPPDATA%/.msf3
 * The ugly test console has been removed for now
 * The official GUI has a splash screen and some bug fixes

This is still not the final release of 3.1, but I would like to hear 
feedback about the install process, desired features in the GUI, and 
anything else you have to say about MSF on Windows.

The short, sweet, autopwn-on-windows demo:

Start the MSFWEB interface
Click on the Console icon
Enter the following commands:

msf> load db_sqlite3
msf> db_create

Pick a target and portscan it:
msf> db_nmap 192.168.0.100

Launch autopwn with port-based matching:
msf> db_autopwn -p -e -x -r

Wait a bit, then click on the Sessions icon for your shells

Enjoy!

-HD


  




Current thread: