Metasploit mailing list archives

Re: db_connect


From: YGN Ethical Hacker Group <lists () yehg net>
Date: Tue, 14 Sep 2010 02:56:21 +0800

We all use postgre by default.

Make sure you've started postgre server and "postgre"  password.

If you want to use it in FastTrack (eg. db user name: postgre, password pg123)


in the file autopwn.py ( located /pentest/exploits/fasttrack/bin/ftsrc
) around line 83

change line 88
Code:
#child1.sendline ('db_destroy postgres:pg123@localhost/pentest')
child1.sendline ('dropdb -U postgres pentest')

change line 90
Code:
child1.sendline ('db_connect postgres:pg123@localhost/pentest')



---------------------------------
Best regards,
YGN Ethical Hacker Group
Yangon, Myanmar
http://yehg.net
Our Lab | http://yehg.net/lab
Our Directory | http://yehg.net/hwd



On Wed, Aug 18, 2010 at 6:47 PM, Ameli bru <jf0rf0rm () gmail com> wrote:
Hi,
it was fine with db_create before running [svn up]. after updation, repose
says that this command is deprecated, and directed toward db_connect, but
when i typed [db_connect] again msf says its not proper syntax.
so i typed [db_connect root:password1@192.168.15.3:5432/metasploit3] again
didnt worked. can any body tell me whats wrong. is syntax proper? or problem
with database connection. this username and password is for mysql running on
an other virtual machine. yesterday i added a new user with this user and
password using metasploit, that means database is giving access on network.
is there something missing that make msf and any database togather?
i typed also
[db_connect root:password1@192.168.15.5]
again didnt worked.
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: