Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hahwul/metasploit-autopwn
db_autopwn plugin of metasploit
https://github.com/hahwul/metasploit-autopwn
Last synced: 27 days ago
JSON representation
db_autopwn plugin of metasploit
- Host: GitHub
- URL: https://github.com/hahwul/metasploit-autopwn
- Owner: hahwul
- Created: 2017-08-17T09:34:31.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2019-12-23T15:25:58.000Z (almost 5 years ago)
- Last Synced: 2024-11-07T22:42:39.256Z (about 1 month ago)
- Language: Ruby
- Size: 13.7 KB
- Stars: 213
- Watchers: 22
- Forks: 70
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - hahwul/metasploit-autopwn - db_autopwn plugin of metasploit (Ruby)
README
# metasploit-autopwn
metasploit plugin for easy exploit & vulnerability attack.
But, the db_autopwn command is removed from official distribution.## Install
### 1. Clone this repo or download "db_autopwn.rb" file
- clone this repository```
#> git clone https://github.com/hahwul/metasploit-autopwn
```
or
- download db_autopwn.rb file in metasploit plugin directory
```
#> wget https://raw.githubusercontent.com/hahwul/metasploit-autopwn/master/db_autopwn.rb
```### 2. Move dB_autopwn.rb file into metasploit plugin directory
```
#> cd metasploit-autopwn
```
```
#> cp db_autopwn.rb /usr/share/metasploit-framework/plugins
```
or (install path)
```
#> cp db_autopwn.rb /opt/metasploit-framework/plugins
```## Usage
#> msfconsole
MSF > load db_autopwn
[*] Successfully loaded plugin: db_autopwn
MSF > db_autopwn -p -R great -e -q 192.168.56.101
[-] The db_autopwn command is DEPRECATED
[-] See http://r-7.co/xY65Zr instead
[*] (1/1301 [0 sessions]): Launching exploit/bsdi/softcart/mercantec_softcart against 192.168.56.44:80...
[*] (2/1301 [0 sessions]): Launching exploit/freebsd/http/watchguard_cmd_exec against 192.168.56.44:80...
[*] (3/1301 [0 sessions]): Launching exploit/linux/antivirus/escan_password_exec against 192.168.56.44:80...
[*] (4/1301 [0 sessions]): Launching exploit/linux/http/accellion_fta_getstatus_oauth against 192.168.56.44:80...
[*] (5/1301 [0 sessions]): Launching exploit/linux/http/advantech_switch_bash_env_exec against 192.168.56.44:80...## Donate