hi I recently reviewed the connection between "Sqlmap" to "Metasploit Pro" #1797

Open
yf007 opened this Issue Apr 5, 2016 · 5 comments

Projects

None yet

2 participants

@yf007
yf007 commented Apr 5, 2016

Hey
I recently reviewed the connection between "Sqlmap" to "Metasploit Pro"
Under Windows 7 64
ther is No more C:\metasploit\apps\pro\msf3
Please fix it
thanks

@stamparm
Member

Where is it now? Also, sqlmap didn't work (well) with Metasploit on Windows at the first place

@stamparm stamparm self-assigned this Apr 11, 2016
@stamparm stamparm added the support label Apr 11, 2016
@yf007
yf007 commented Nov 10, 2016

in kali linux i get this

[22:39:18] [INFO] fetched random HTTP User-Agent header from file '/usr/share/sqlmap/txt/user-agents.txt': 'Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.0)'
[22:39:18] [INFO] testing connection to the target URL
[22:39:18] [INFO] searching for forms
[22:39:19] [WARNING] the provided Metasploit Framework path '/opt/metasploit/apps/pro/vendor/bundle/ruby/msfconsole' is not valid. The cause could be that the path does not exists or that one or more of the needed Metasploit executables within msfcli, msfconsole, msfencode and msfpayload do not exist
[22:39:19] [WARNING] sqlmap is going to look for Metasploit Framework installation inside the environment path(s)
[22:39:19] [INFO] Metasploit Framework has been found installed in the '/usr/local/bin' path

and the files = msfcli, msfconsole, msfencode and msfpayload do not exist

@stamparm
Member

@yf007 I think that you are wrong. Please in response write what do you get for:

$ ls /usr/local/bin/msfcli || ls /usr/local/bin/msfconsole || ls /usr/local/bin/msfvenom || ls /usr/local/bin/msfencode || ls /usr/local/bin/msfpayload

This is exactly what the sqlmap does.

@yf007
yf007 commented Nov 10, 2016

I'm talking about software
metasploit pro

@stamparm
Member

@yf007 you said: and the files = msfcli, msfconsole, msfencode and msfpayload do not exist and I said to you to run ls /usr/local/bin/msfcli || ls /usr/local/bin/msfconsole || ls /usr/local/bin/msfvenom || ls /usr/local/bin/msfencode || ls /usr/local/bin/msfpayload. Now, what's the I'm talking about software metasploit pro argument for???

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment