sammy | Date: Friday, 2012-02-17, 8:20 AM | Message # 1 |
Private
Group: Checked
Messages: 11
Awards: 0
Reputation: 0
Status: Offline
| Some of the companions may have heard about db_autopwn which typically uses postgresql as the database to perform the attack exploits, excessive use menggurangi db_autopwn is that we can use the time to carry out attacks.
root @ bt: ~ # apt-get install ruby libpgsql postgresql-libpq-dev root @ bt: ~ # su postgres sh-4.1 $ createuser root-P Could not change directory to "/ root" Enter password for new role: Enter it again: Shall the new role be a superuser? (y / n) n Shall the new role be allowed to create databases? (y / n) n Shall the new role be allowed to create more new roles? (y / n) n sh-4.1 $ createdb - owner = root metasploit Could not change directory to "/ root" exit sh-4.1 $ exit exit
|
|
| |