[root@devel ~]# service metasploit status;msfpro
metasploit is running
postgresql already running
prosvc is running
nginx is running
[*] Please wait while the Metasploit Pro Console initializes...
[*] Starting Metasploit Console...
_---------.
.' ####### ;."
.---,. ;@ @@; .---,.. ." @@@@@'.,'@@ @@@@@',.'@@@@ ". '-.@@@@@@@@@@@@@ @@@@@@@@@@@@@ @;
.@@@@@@@@@@@@ @@@@@@@@@@@@@@ .'
"--'.@@@ -.@ @ ,'- .'--"
".@' ; @ @ . ;' |@@@@ @@@ @ . ' @@@ @@ @@ ,
.@@@@ @@ .
',@@ @ ; _____________
( 3 C ) /|___ / Metasploit!
;@'. *****,." |--- _____________/
'(.,...."/
=[ metasploit v4.4.0-dev [core:4.4 api:1.0]
- -- --=[ 889 exploits - 516 auxiliary - 152 post
- -- --=[ 251 payloads - 28 encoders - 8 nops
[*] Successfully loaded plugin: pro
msf > search jboss
msf > exit
[root@devel ~]# service metasploit stop;msfpro
metasploit is stopped
LOG: unexpected EOF on client connection
LOG: unexpected EOF on client connection
LOG: unexpected EOF on client connection
LOG: unexpected EOF on client connection
prosvc is stopped
nginx is stopped
LOG: received smart shutdown request
LOG: autovacuum launcher shutting down
LOG: shutting down
LOG: database system is shut down
/opt/metasploit-4.3.0/postgresql/scripts/ctl.sh : postgresql stopped
[*] Please wait while the Metasploit Pro Console initializes...
[*] Starting Metasploit Console...
[-] Failed to connect to the database: could not connect to server: Connection refused
Is the server running on host "localhost" (::1) and accepting
TCP/IP connections on port 7337?
could not connect to server: Connection refused
Is the server running on host "localhost" (127.0.0.1) and accepting
TCP/IP connections on port 7337?
{"adapter"=>"postgresql", "database"=>"msf3", "username"=>"msf3", "password"=>"fd401d58", "port"=>7337, "host"=>"localhost", "pool"=>256, "timeout"=>5} ["/opt/metasploit-4.3.0/apps/pro/msf3/lib/gemcache/ruby/1.9.1/gems/activerecord-3.2.2/lib/active_record/connection_adapters/postgresql_adapter.rb:1194:in initialize'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/gemcache/ruby/1.9.1/gems/activerecord-3.2.2/lib/active_record/connection_adapters/postgresql_adapter.rb:1194:in
new'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/gemcache/ruby/1.9.1/gems/activerecord-3.2.2/lib/active_record/connection_adapters/postgresql_adapter.rb:1194:in connect'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/gemcache/ruby/1.9.1/gems/activerecord-3.2.2/lib/active_record/connection_adapters/postgresql_adapter.rb:329:in
initialize'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/gemcache/ruby/1.9.1/gems/activerecord-3.2.2/lib/active_record/connection_adapters/postgresql_adapter.rb:28:in new'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/gemcache/ruby/1.9.1/gems/activerecord-3.2.2/lib/active_record/connection_adapters/postgresql_adapter.rb:28:in
postgresql_connection'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/gemcache/ruby/1.9.1/gems/activerecord-3.2.2/lib/active_record/connection_adapters/abstract/connection_pool.rb:277:in new_connection'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/gemcache/ruby/1.9.1/gems/activerecord-3.2.2/lib/active_record/connection_adapters/abstract/connection_pool.rb:287:in
checkout_new_connection'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/msf/core/patches/active_record.rb:58:in block (2 levels) in checkout'", "/opt/metasploit-4.3.0/ruby/lib/ruby/1.9.1/monitor.rb:211:in
mon_synchronize'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/msf/core/patches/active_record.rb:53:in block in checkout'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/msf/core/patches/active_record.rb:52:in
loop'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/msf/core/patches/active_record.rb:52:in checkout'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/gemcache/ruby/1.9.1/gems/activerecord-3.2.2/lib/active_record/connection_adapters/abstract/connection_pool.rb:95:in
connection'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/msf/core/patches/active_record.rb:21:in with_connection'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/msf/core/db.rb:204:in
default_workspace'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/msf/core/db_manager.rb:203:in connect'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/msf/ui/console/driver.rb:194:in
initialize'", "/opt/metasploit-4.3.0/apps/pro/msf3/msfconsole:142:in new'", "/opt/metasploit-4.3.0/apps/pro/msf3/msfconsole:142:in
<top (required)>'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/gemcache/ruby/1.9.1/gems/activesupport-3.2.2/lib/active_support/dependencies.rb:245:in load'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/gemcache/ruby/1.9.1/gems/activesupport-3.2.2/lib/active_support/dependencies.rb:245:in
block in load'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/gemcache/ruby/1.9.1/gems/activesupport-3.2.2/lib/active_support/dependencies.rb:236:in load_dependency'", "/opt/metasploit-4.3.0/apps/pro/msf3/lib/gemcache/ruby/1.9.1/gems/activesupport-3.2.2/lib/active_support/dependencies.rb:245:in
load'", "/opt/metasploit-4.3.0/apps/pro/engine/msfpro:189:in `
'"]
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% %%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% %% %%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% % %%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% %% %%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%% %%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%% %%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%% %% %%%%%%%%%%% %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%% %%%%%
%%%% %% %% % %% %% %%%%% % %%%% %% %%%%%% %%
%%%% %% %% % %%% %%%% %%%% %% %%%% %%%% %% %% %% %%% %% %%% %%%%%
%%%% %%%%%% %% %%%%%% %%%% %%% %%%% %% %% %%% %%% %% %% %%%%%
%%%%%%%%%%%% %%%% %%%%% %% %% % %% %%%% %%%% %%% %%% %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%% %%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% %%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
=[ metasploit v4.4.0-dev [core:4.4 api:1.0]
- -- --=[ 889 exploits - 516 auxiliary - 152 post
- -- --=[ 251 payloads - 28 encoders - 8 nops
[*] Successfully loaded plugin: pro
msf > search jboss
Matching Modules
Name Disclosure Date Rank Description
auxiliary/admin/http/jboss_seam_exec 2010-07-19 normal JBoss Seam 2 Remote Command Execution
auxiliary/scanner/http/jboss_vulnscan normal JBoss Vulnerability Scanner
exploit/multi/http/jboss_bshdeployer 2010-04-26 excellent JBoss JMX Console Beanshell Deployer WAR Upload and Deployment
exploit/multi/http/jboss_deploymentfilerepository 2010-04-26 excellent JBoss Java Class DeploymentFileRepository WAR Deployment
exploit/multi/http/jboss_maindeployer 2007-02-20 excellent JBoss JMX Console Deployer Upload and Execute
msf > exit
[root@devel ~]#