Metasploit mailing list archives
db_autopwn - What module succeded ?
From: andres.riancho at gmail.com (Andres Riancho)
Date: Fri, 14 Dec 2007 09:48:09 -0300
List, I'm playing with db_autopwn and after some tries I got it working and successfully exploited four different vulnerabilities on four different machines. What I get as a response of the "db_autopwn" command is something like this: [*] Analysis completed in 3.19079804420471 seconds (0 vulns / 0 refs) [*] Matched auxiliary/dos/windows/smb/rras_vls_null_deref against 172.20.6.39:445... [*] Matched exploit/windows/smb/ms04_031_netdde against 172.20.6.39:445... [*] Launching exploit/windows/smb/ms04_031_netdde (2/17) against 172.20.6.39:445... [*] Started bind handler [*] Matched exploit/windows/smb/ms04_011_lsass against 172.20.6.39:445... [*] Launching exploit/windows/smb/ms04_011_lsass (3/17) against 172.20.6.39:445... [*] Started bind handler [*] Matched exploit/solaris/samba/trans2open against 172.20.6.39:139... [*] Launching exploit/solaris/samba/trans2open (4/17) against 172.20.6.39:139... [*] >> Exception during launch from exploit/solaris/samba/trans2open: A target has not been selected. [*] Matched exploit/windows/smb/ms05_039_pnp against 172.20.6.39:445... [*] Launching exploit/windows/smb/ms05_039_pnp (5/17) against 172.20.6.39:445... [*] Started bind handler [*] Connecting to the SMB service... [*] Matched exploit/windows/dcerpc/ms03_026_dcom against 172.20.6.39:135... [*] Launching exploit/windows/dcerpc/ms03_026_dcom (6/17) against 172.20.6.39:135... [*] Started bind handler [*] Matched exploit/osx/samba/trans2open against 172.20.6.39:139... [*] Trying target Windows NT SP3-6a/2000/XP/2003 Universal... [*] Matched exploit/windows/smb/ms06_025_rasmans_reg against 172.20.6.39:445... [*] Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0 at ncacn_ip_tcp:172.20.6.39[135] ... [*] Matched exploit/windows/http/sybase_easerver against 172.20.6.39:8080... [*] Launching exploit/windows/http/sybase_easerver (9/17) against 172.20.6.39:8080... ... ... many more lines ... After that I use "sessions -l" to list all available sessions, and neither the above log , nor the session information tells me what module successfully exploited which host! Is there a way to know this ? If not, I want to do a feature request that allows me to get this info with the sessions command. Cheers, -- Andres Riancho http://w3af.sourceforge.net/ Web Application Attack and Audit Framework
Current thread:
- db_autopwn - What module succeded ? Andres Riancho (Dec 14)
- db_autopwn - What module succeded ? H D Moore (Dec 14)
- db_autopwn - What module succeded ? Andres Riancho (Dec 14)
- db_autopwn - What module succeded ? H D Moore (Dec 14)