Metasploit mailing list archives

error with db_autopwn


From: tim.e.mcguire at gmail.com (Timothy McGuire)
Date: Thu, 7 Jun 2007 15:38:32 -0500

Hello,
I am trying to run db_autopwn against a vmware instance of Damn Vulnerable
Linux.  I've studied the instructions at
http://blog.metasploit.com/2006/09/metasploit-30-automated-exploitation.html

I didn't follow the install steps there because the required parts seem to
be in my Windows install.

I have a database named metasploit2 populated by the postgres.sql script
that came with the metasploit framework
Here is what I am doing:

load db_postgres

db_connect superuser:superpassword at 127.0.0.1:5432/metasploit2

db_nmap -v -A 192.168.226.129    (this populates my services table with
interesting ports)

db_services
[*] Service: host=192.168.226.129 port=22 proto=tcp state=up name=ssh
[*] Service: host=192.168.226.129 port=80 proto=tcp state=up name=http
[*] Service: host=192.168.226.129 port=631 proto=tcp state=up name=ipp
[*] Service: host=192.168.226.129 port=3306 proto=tcp state=up name=mysql
[*] Service: host=192.168.226.129 port=6000 proto=tcp state=up name=X11

db_autopwn -t -p

and result is:
[-] Error while running command db_autopwn: undefined method `type_oid' for
nil:NilClass

Call stack:
C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/postgres-
pr-0.4.0/lib/postgres-pr/postgres-compat.rb:93:in `type'
C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord-
1.15.2/lib/active_record/connection_adapters/postgresql_adapter.rb:443:in
`select'
C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord-
1.15.2/lib/active_record/connection_adapters/postgresql_adapter.rb:440:in
`each_index'
C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord-
1.15.2/lib/active_record/connection_adapters/postgresql_adapter.rb:440:in
`select'
C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord-
1.15.2/lib/active_record/connection_adapters/postgresql_adapter.rb:438:in
`each'
C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord-
1.15.2/lib/active_record/connection_adapters/postgresql_adapter.rb:438:in
`select'
C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord-
1.15.2/lib/active_record/connection_adapters/abstract/database_statements.rb:7:in
`select_all' C:/Program
Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord-1.15.2/lib/active_record/base.rb:427:in
`find_by_sql'
C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord-
1.15.2/lib/active_record/base.rb:997:in `find_every'
C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord-
1.15.2/lib/active_record/base.rb:991:in `find_initial'
C:/Program Files/Metasploit/Framework3/lib/ruby/gems/1.8/gems/activerecord-
1.15.2/lib/active_record/base.rb:417:in `find'
etc....

So, any hints would help.  I don't see any exploits that would specifically
match any vulnerabilities I have in the target, so I don't expect the
command to compromise the system, but I'd like to know what the errors mean.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070607/b8ed4732/attachment.htm>


Current thread: