Jump to content

0x06tcp

Members
  • Posts

    2
  • Joined

  • Last visited

Recent Profile Visitors

656 profile views

0x06tcp's Achievements

Newbie

Newbie (1/14)

  1. Thanks newbi3 for your reply. Yes I tried it but did not work. msf > service metasploit status [*] exec: service metasploit status Metasploit rpc server is not running ... failed! Metasploit web server is not running ... failed! Metasploit worker is not running ... failed! msf > msf > msf > service metasploit start [*] exec: service metasploit start Postgresql must be started before Metasploit ... failed! msf > msf > msf > service postgresql status [*] exec: service postgresql status Running clusters: msf > msf > msf > service postgresql start [*] exec: service postgresql start Starting PostgreSQL 9.1 database server: main. msf > msf > msf > service postgresql status [*] exec: service postgresql status Running clusters: 9.1/main msf > msf > msf > search oracle [!] Database not connected or cache not built, using slow search Matching Modules ================ Name Disclosure Date Rank Description ---- --------------- ---- ----------- auxiliary/admin/oracle/ora_ntlm_stealer 2009-04-07 normal Oracle SMB Relay Code Execution auxiliary/admin/oracle/oracle_login 2008-11-20 normal Oracle Account Discovery auxiliary/admin/oracle/oracle_sql 2007-12-07 normal Oracle SQL Generic Query auxiliary/admin/oracle/oraenum normal Oracle Database Enumeration auxiliary/admin/oracle/osb_execqr 2009-01-14 normal Oracle Secure Backup exec_qr() Command Injection Vulnerability ....
  2. Hello, does anyone here have similar issue with Metasploit? Error message: [FAIL] Postgresql must be started before Metasploit ... failed! root@kali:~# service metasploit status [FAIL] Metasploit rpc server is not running ... failed! [FAIL] Metasploit web server is not running ... failed! [FAIL] Metasploit worker is not running ... failed! root@kali:~# root@kali:~# service metasploit start [FAIL] Postgresql must be started before Metasploit ... failed! root@kali:~# root@kali:~# msfconsole [-] Failed to connect to the database: could not connect to server: Connection refused Is the server running on host "localhost" (::1) and accepting TCP/IP connections on port 5432? could not connect to server: Connection refused Is the server running on host "localhost" (127.0.0.1) and accepting TCP/IP connections on port 5432? +-------------------------------------------------------+ | METASPLOIT by Rapid7 | +---------------------------+---------------------------+ | __________________ | | | ==c(______(o(______(_() | |""""""""""""|======[*** | | )=\ | | EXPLOIT \ | | // \\ | |_____________\_______ | | // \\ | |==[msf >]============\ | | // \\ | |______________________\ | | // RECON \\ | \(@)(@)(@)(@)(@)(@)(@)/ | | // \\ | ********************* | +---------------------------+---------------------------+ | o O o | \'\/\/\/'/ | | o O | )======( | | o | .' LOOT '. | | |^^^^^^^^^^^^^^|l___ | / _||__ \ | | | PAYLOAD |""\___, | / (_||_ \ | | |________________|__|)__| | | __||_) | | | |(@)(@)"""**|(@)(@)**|(@) | " || " | | = = = = = = = = = = = = | '--------------' | +---------------------------+---------------------------+ Trouble managing data? List, sort, group, tag and search your pentest data in Metasploit Pro -- learn more on http://rapid7.com/metasploit =[ metasploit v4.10.0-2014092602 [core:4.10.0.pre.2014092602 api:1.0.0]] + -- --=[ 1346 exploits - 741 auxiliary - 217 post ] + -- --=[ 340 payloads - 35 encoders - 8 nops ] + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ] msf > msf > search name:oracle [!] Database not connected or cache not built, using slow search Matching Modules ================ Name Disclosure Date Rank Description ---- --------------- ---- ----------- auxiliary/admin/oracle/ora_ntlm_stealer 2009-04-07 normal Oracle SMB Relay Code Execution auxiliary/admin/oracle/oracle_login 2008-11-20 normal Oracle Account Discovery auxiliary/admin/oracle/oracle_sql 2007-12-07 normal Oracle SQL Generic Query auxiliary/admin/oracle/oraenum normal Oracle Database Enumeration .... Oracle 10gR2 TNS Listener AUTH_SESSKEY Buffer Overflow exploit/windows/oracle/tns_service_name 2002-05-27 good Oracle 8i TNS Listener SERVICE_NAME Buffer Overflow msf > root@kali:~# uname -r 3.14-kali1-amd64 root@kali:~# Thank you for any help, it is greatly appreciated.
×
×
  • Create New...