zoukankan      html  css  js  c++  java
  • Kali2017 Metasploit连接postgresql数据库

    msfdb:msf数据库管理命令

    1、查看msf数据库连接状态

    msf > db_status
    [*] postgresql selected, no connection    //未连接
    

    2、msfdb命令

    msf > msfdb      //msfdb可以在命令行直接使用
    [*] exec: msfdb
    
    
    Manage a metasploit framework database
    
      msfdb init    # initialize the database          //初始化数据库
      msfdb reinit  # delete and reinitialize the database  //清空配置重新初始化数据库
      msfdb delete  # delete database and stop using it    //删除数据库并停止使用
      msfdb start   # start the database         //启动数据库
      msfdb stop    # stop the database         //停止数据库

    3、初始化数据库

    msf > msfdb init
    [*] exec: msfdb init
    
    Creating database user 'msf'
    为新角色输入的口令: 
    再输入一遍: 
    Creating databases 'msf' and 'msf_test'
    Creating configuration file in /usr/share/metasploit-framework/config/database.yml
    Creating initial database schema

    4、查看msf数据库配置文件

    root@kali:~# cat /usr/share/metasploit-framework/config/database.yml
    development:
      adapter: postgresql
      database: msf
      username: msf
      password: EUsDzzKRsyxvmwmPI+dZ2KF1rojkKeEKqNRvNbV7LdY=
      host: localhost
      port: 5432
      pool: 5
      timeout: 5
    
    production:
      adapter: postgresql
      database: msf
      username: msf
      password: EUsDzzKRsyxvmwmPI+dZ2KF1rojkKeEKqNRvNbV7LdY=
      host: localhost
      port: 5432
      pool: 5
      timeout: 5
    
    test:
      adapter: postgresql
      database: msf_test
      username: msf
      password: EUsDzzKRsyxvmwmPI+dZ2KF1rojkKeEKqNRvNbV7LdY=
      host: localhost
      port: 5432
      pool: 5
      timeout: 5

    5、启动或重启msf

    root@kali:~# msfconsole
                                                      
    
     ______________________________________________________________________________
    |                                                                              |
    |                          3Kom SuperHack II Logon                             |
    |______________________________________________________________________________|
    |                                                                              |
    |                                                                              |
    |                                                                              |
    |                 User Name:          [   security    ]                        |
    |                                                                              |
    |                 Password:           [               ]                        |
    |                                                                              |
    |                                                                              |
    |                                                                              |
    |                                   [ OK ]                                     |
    |______________________________________________________________________________|
    |                                                                              |
    |                                                       https://metasploit.com |
    |______________________________________________________________________________|
    
    
           =[ metasploit v4.15.5-dev                          ]
    + -- --=[ 1673 exploits - 959 auxiliary - 294 post        ]
    + -- --=[ 489 payloads - 40 encoders - 9 nops             ]
    + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
    
    msf > db_status
    [*] postgresql connected to msf
  • 相关阅读:
    关于产品那些事
    关于“编程的本质”的探讨
    分享一款在线贝塞尔曲线调试器
    HTML、CSS、JS对unicode字符的不同处理
    HTTP Content-Disposition Explanation [ from MDN ]
    认证 (authentication) 和授权 (authorization) 的区别
    事件驱动引擎会取代多线程编程吗
    你所不知道的JSON
    都有哪些特殊而实用的的搜索引擎?
    巨头们的GitHub仓库整理
  • 原文地址:https://www.cnblogs.com/captainRoB/p/7376743.html
Copyright © 2011-2022 走看看