BT5 Metasploit(MSF)连接postgersql数据库
程序员文章站
2022-04-22 18:16:29
1,先查看postgresql的端口,默认是自动开启的,端口7337 。
root@bt:~# netstat -tnpl |grep postgres
tcp ...
1,先查看postgresql的端口,默认是自动开启的,端口7337 。
root@bt:~# netstat -tnpl |grep postgres
tcp 0 0 127.0.0.1:7337 0.0.0.0:* LISTEN 1100/postgres
tcp6 0 0 ::1:7337 :::* LISTEN 1100/postgres
2,查看msf的配置,里面有数据库用户和密码
root@bt:~# cat /opt/metasploit/config/database.yml
development: www.2cto.com
adapter: "postgresql"
database: "msf3dev"
username: "msf3"
password: "c80c3cea"
port: 7337
host: "localhost"
pool: 256
timeout: 5
3,开启msf专业版
# /opt/metasploit/msfpro
4,连接数据库
msf> db_connect msf3:c80c3cea@127.0.0.1:7337/msf3
root@bt:~# netstat -tnpl |grep postgres
tcp 0 0 127.0.0.1:7337 0.0.0.0:* LISTEN 1100/postgres
tcp6 0 0 ::1:7337 :::* LISTEN 1100/postgres
2,查看msf的配置,里面有数据库用户和密码
root@bt:~# cat /opt/metasploit/config/database.yml
development: www.2cto.com
adapter: "postgresql"
database: "msf3dev"
username: "msf3"
password: "c80c3cea"
port: 7337
host: "localhost"
pool: 256
timeout: 5
3,开启msf专业版
# /opt/metasploit/msfpro
4,连接数据库
msf> db_connect msf3:c80c3cea@127.0.0.1:7337/msf3