warlock37 Posted February 23, 2012 Share Posted February 23, 2012 Hi there i have some issue related metasploit v4.2.0. i just update it from 3 to 4.2.0. now when i going to try db_autopwn option it just say "command not found". can u tell me how to fix this problem. i m using BT5R1-GNOME-VM-32. metasploit 4.2.0 please help me thank you warm regards. Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted February 23, 2012 Share Posted February 23, 2012 db_autopwn was removed. Quote from HD Moore Nov 23, 2011 This was removed, it did not fit in the scope of the framework, was unmaintained, and caused damage to systems when used in the default mode. https://community.rapid7.com/message/2159#2159 https://community.rapid7.com/message/2159#2159 Quote Link to comment Share on other sites More sharing options...
nopenopenope Posted February 23, 2012 Share Posted February 23, 2012 also. when you update metasploit, and SET, make sure you edit set_config for the new metasploit location, i had this problem right away. (i dont remember where they were) and for what ever reason i now have double application launchers in my metasploit menu in gnome. basically they changed directory's so make sure you update all your config files and scripts :) Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted February 23, 2012 Share Posted February 23, 2012 db_autopwn was removed. See previous post. also. when you update metasploit, and SET, make sure you edit set_config for the new metasploit location, i had this problem right away. (i dont remember where they were) and for what ever reason i now have double application launchers in my metasploit menu in gnome. basically they changed directory's so make sure you update all your config files and scripts :) Not sure how accurate that is. I update my BT machine with a quick and dirty script I made and it has never messed anything up. Did you install metasploit to your own directory on BT5? echo "--Update, Upgrade, Dist-Upgrade--" apt-get update && apt-get upgrade -y && apt-get dist-upgrade -y echo "-- Metasploit Update --" cd /pentest/exploits/framework && svn update . echo "-- SET Update --" cd /pentest/exploits/set && svn update . /pentest/exploits/framework is just a symlink to /opt/framework/msf3 but the version after updates is metasploit 4. Quote Link to comment Share on other sites More sharing options...
nopenopenope Posted February 23, 2012 Share Posted February 23, 2012 (edited) nope, just apt-get update, apt-get upgrade, apt-get dist-upgrade, msfupdate, then the set update menu wasn't working for me, after i saw rel1k updated it on twitter i dicided to reinstall it with synaptic. then my set_config couldn't find the msf directory, so looking at that i found 2 locations, 1 for msf 3 and msf 4. it also jacked up my gnome menu for metasploit. what version of SET are you using? Edited February 23, 2012 by soka80 Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted February 23, 2012 Share Posted February 23, 2012 I run the newest SET, i update every time i boot the machine. if you do the SVN update method (per the code in previous post in a update_script.sh) I feel it gives less chance for a F@#$ up. Quote Link to comment Share on other sites More sharing options...
nopenopenope Posted February 23, 2012 Share Posted February 23, 2012 I run the newest SET, i update every time i boot the machine. if you do the SVN update method (per the code in previous post in a update_script.sh) I feel it gives less chance for a F@#$ up. Ok, I'll give it a shot, As soon as bt5 r2 comes out I'm going to install from scratch, my configs are messed up everywhere and its screwing everything else up, mainly SET / metasploit <_< and i'm getting sick of going around trying to change every config file. Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted February 23, 2012 Share Posted February 23, 2012 You shouldn't have to edit configs lol. It sounds like you installed another instance of each somehow. if you did like aptitude install metasploit then yeah your stuff is going to be all messed up. Quote Link to comment Share on other sites More sharing options...
nopenopenope Posted February 23, 2012 Share Posted February 23, 2012 I've done alot of stuff to screw it up, I get impatient for the repo's to get updated so I start installing crap manually. I should probably stop that lol. Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted February 23, 2012 Share Posted February 23, 2012 Take my code from above, toss it in an update.sh in your home directory on BT (after fresh install) and chmod +x update.sh then when you boot the VM, login, ./update.sh && startx You could add the startx into the update.sh file, but sometimes I do things that don't require updating metasploit and SET or the base image so I just startx. Flexibility :) Quote Link to comment Share on other sites More sharing options...
warlock37 Posted February 24, 2012 Author Share Posted February 24, 2012 so there is any other way to perform the automatic exploitation like db_autopwn.????? is there any other option available.? thank you db_autopwn was removed. Quote from HD Moore Nov 23, 2011 https://community.rapid7.com/message/2159#2159 https://community.rapid7.com/message/2159#2159 Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted February 24, 2012 Share Posted February 24, 2012 There is a fork, read the links in this post. http://forums.hak5.org/index.php?showtopic=25624&view=findpost&p=196280 Quote Link to comment Share on other sites More sharing options...
reflex Posted March 1, 2012 Share Posted March 1, 2012 Hey ppl, put this in your metasploit plugins folder http://www.mediafire.com/file/44nedlahq4pisfx/db_autopwn.rb When MSF starts type "load db_autowpn" then "db_autopwn" for the options. :) Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted March 1, 2012 Share Posted March 1, 2012 Hey ppl, put this in your metasploit plugins folder http://www.mediafire.com/file/44nedlahq4pisfx/db_autopwn.rb When MSF starts type "load db_autowpn" then "db_autopwn" for the options. :) One of the community members maintains a fork with the autopwn code implemented as a plugin:https://github.com/neinwechter/metasploit-framework -HD Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.