root@bt:~# ruby1.8 /pentest/exploits/framework3/msfconsole
888 888 d8b888
888 888 Y8P888
888 888 888
88888b.d88b. .d88b. 888888 8888b. .d8888b 88888b. 888 .d88b. 888888888
888 “888 “88bd8P Y8b888 “88b88K 888 “88b888d88″”88b888888
888 888 88888888888888 .d888888″Y8888b.888 888888888 888888888
888 888 888Y8b. Y88b. 888 888 X88888 d88P888Y88..88P888Y88b.
888 888 888 “Y8888 “Y888″Y888888 88888P’88888P” 888 “Y88P” 888 “Y888
888
888
888
=[ metasploit v3.7.0-release [core:3.7 api:1.0]
+ — –=[ 684 exploits – 355 auxiliary
+ — –=[ 217 payloads – 27 encoders – 8 nops
msf > db_driver mysql
[*] Using database driver mysql
msf > db_connect root:okeydokey@127.0.0.1:3306/metasploit
msf > db_status
[*] mysql connected to metasploit
msf > db_nmap -sS -n okeydokey.com
[*] Nmap: Starting Nmap 5.51 ( http://nmap.org ) at 2011-08-18 03:39 WIT
[*] Nmap: Nmap scan report for okeydokey.com
[*] Nmap: Host is up (0.14s latency).
[*] Nmap: Not shown: 995 closed ports
[*] Nmap: PORT STATE SERVICE
[*] Nmap: 21/tcp open ftp
[*] Nmap: 22/tcp open ssh
[*] Nmap: 80/tcp open http
[*] Nmap: 111/tcp open rpcbind
[*] Nmap: 3306/tcp open mysql
[*] Nmap: Nmap done: 1 IP address (1 host up) scanned in 32.27 seconds
msf > exit
thx to :
http://www.backtrack-linux.org/forums/ fnord0
http://forums.techarena.in/ !cons