Multi Gather DbVisualizer Connections Settings - Metasploit
This page contains detailed information about how to use the post/multi/gather/dbvis_enum metasploit module. For list of all metasploit modules, visit the Metasploit Module Library.
Module Overview
Name: Multi Gather DbVisualizer Connections Settings
Module: post/multi/gather/dbvis_enum
Source code: modules/post/multi/gather/dbvis_enum.rb
Disclosure date: -
Last modification time: 2021-10-06 13:43:31 +0000
Supported architecture(s): -
Supported platform(s): Linux, Windows
Target service / protocol: -
Target network port(s): -
List of CVEs: -
DbVisualizer stores the user database configuration in dbvis.xml. This module retrieves the connections settings from this file and decrypts the encrypted passwords.
Module Ranking and Traits
Module Ranking:
- normal: The exploit is otherwise reliable, but depends on a specific version and can't (or doesn't) reliably autodetect. More information about ranking can be found here.
Basic Usage
There are two ways to execute this post module.
From the Meterpreter prompt
The first is by using the "run" command at the Meterpreter prompt. It allows you to run the post module against that specific session:
meterpreter > run post/multi/gather/dbvis_enum
From the msf prompt
The second is by using the "use" command at the msf prompt. You will have to figure out which session ID to set manually. To list all session IDs, you can use the "sessions" command.
msf > use post/multi/gather/dbvis_enum
msf post(dbvis_enum) > show options
... show and set options ...
msf post(dbvis_enum) > set SESSION session-id
msf post(dbvis_enum) > exploit
If you wish to run the post against all sessions from framework, here is how:
1 - Create the following resource script:
framework.sessions.each_pair do |sid, session|
run_single("use post/multi/gather/dbvis_enum")
run_single("set SESSION #{sid}")
run_single("run")
end
2 - At the msf prompt, execute the above resource script:
msf > resource path-to-resource-script
Required Options
- SESSION: The session to run this module on.
Go back to menu.
Msfconsole Usage
Here is how the multi/gather/dbvis_enum post exploitation module looks in the msfconsole:
msf6 > use post/multi/gather/dbvis_enum
msf6 post(multi/gather/dbvis_enum) > show info
Name: Multi Gather DbVisualizer Connections Settings
Module: post/multi/gather/dbvis_enum
Platform: Linux, Windows
Arch:
Rank: Normal
Provided by:
David Bloom
Compatible session types:
Meterpreter
Shell
Basic options:
Name Current Setting Required Description
---- --------------- -------- -----------
ITERATION_COUNT 10 no The iteration count used in key derivation
PASSPHRASE no The hardcoded passphrase used for encryption
SESSION yes The session to run this module on.
Description:
DbVisualizer stores the user database configuration in dbvis.xml.
This module retrieves the connections settings from this file and
decrypts the encrypted passwords.
Module Options
This is a complete list of options available in the multi/gather/dbvis_enum post exploitation module:
msf6 post(multi/gather/dbvis_enum) > show options
Module options (post/multi/gather/dbvis_enum):
Name Current Setting Required Description
---- --------------- -------- -----------
ITERATION_COUNT 10 no The iteration count used in key derivation
PASSPHRASE no The hardcoded passphrase used for encryption
SESSION yes The session to run this module on.
Advanced Options
Here is a complete list of advanced options supported by the multi/gather/dbvis_enum post exploitation module:
msf6 post(multi/gather/dbvis_enum) > show advanced
Module advanced options (post/multi/gather/dbvis_enum):
Name Current Setting Required Description
---- --------------- -------- -----------
VERBOSE false no Enable detailed status messages
WORKSPACE no Specify the workspace for this module
Post Actions
This is a list of all post exploitation actions which the multi/gather/dbvis_enum module can do:
msf6 post(multi/gather/dbvis_enum) > show actions
Post actions:
Name Description
---- -----------
Evasion Options
Here is the full list of possible evasion options supported by the multi/gather/dbvis_enum post exploitation module in order to evade defenses (e.g. Antivirus, EDR, Firewall, NIDS etc.):
msf6 post(multi/gather/dbvis_enum) > show evasion
Module evasion options:
Name Current Setting Required Description
---- --------------- -------- -----------
Go back to menu.
Error Messages
This module may fail with the following error messages:
Check for the possible causes from the code snippets below found in the module source code. This can often times help in identifying the root cause of the problem.
File not found: <DBVIS_FILE>
Here is a relevant code snippet related to the "File not found: <DBVIS_FILE>" error message:
56: dbvis_file = user_profile + "\\.dbvis\\config70\\dbvis.xml"
57: end
58:
59: unless file?(dbvis_file)
60: # File not found, we next try with the old config path
61: print_status("File not found: #{dbvis_file}")
62: print_status('This could be an older version of dbvis, trying old path')
63: case session.platform
64: when 'linux'
65: dbvis_file = "#{user_base}.dbvis/config/dbvis.xml"
66: when 'windows'
File not found: <DBVIS_FILE>
Here is a relevant code snippet related to the "File not found: <DBVIS_FILE>" error message:
65: dbvis_file = "#{user_base}.dbvis/config/dbvis.xml"
66: when 'windows'
67: dbvis_file = user_profile + "\\.dbvis\\config\\dbvis.xml"
68: end
69: unless file?(dbvis_file)
70: print_error("File not found: #{dbvis_file}")
71: return
72: end
73: oldversion = true
74: end
75:
Nothing read from file: <DBVIS_FILE>, file may be empty
Here is a relevant code snippet related to the "Nothing read from file: <DBVIS_FILE>, file may be empty" error message:
78: raw_xml = ""
79: begin
80: raw_xml = read_file(dbvis_file)
81: rescue EOFError
82: # If there's nothing in the file, we hit EOFError
83: print_error("Nothing read from file: #{dbvis_file}, file may be empty")
84: return
85: end
86:
87: if oldversion
88: # Parse old config file
No database settings found
Here is a relevant code snippet related to the "No database settings found" error message:
91: # Parse new config file
92: db_table = parse_new_config_file(raw_xml)
93: end
94:
95: if db_table.rows.empty?
96: print_status('No database settings found')
97: else
98: print_line
99: print_line(db_table.to_s)
100: print_good('Try to query listed databases with dbviscmd.sh (or .bat) -connection <alias> -sql <statements> and have fun!')
101: print_line()
Go back to menu.
Related Pull Requests
- #14202 Merged Pull Request: Implement the zeitwerk autoloader within lib/msf/core
- #8716 Merged Pull Request: Print_Status -> Print_Good (And OCD bits 'n bobs)
- #8338 Merged Pull Request: Fix msf/core and self.class msftidy warnings
- #7507 Merged Pull Request: Refactor arch/platform, refactor TLV XOR, add UUID to each packet, fix payload uuid/arch/platform tracking, and update everything to match
- #7200 Merged Pull Request: Rex::Ui::Text cleanup
- #6655 Merged Pull Request: use MetasploitModule as a class name
- #6648 Merged Pull Request: Change metasploit class names
- #5453 Merged Pull Request: Update dbvis_enum to use the new cred API
- #5429 Merged Pull Request: Decrypt encrypted passwords in DBVisualizer
- #4379 Merged Pull Request: fix msftidy warnings
- #3552 Merged Pull Request: Correct DbVisualizer title name
- #3522 Merged Pull Request: Dbvis enum
Go back to menu.
See Also
Check also the following modules related to this module:
- post/multi/gather/apple_ios_backup
- post/multi/gather/aws_ec2_instance_metadata
- post/multi/gather/aws_keys
- post/multi/gather/check_malware
- post/multi/gather/chrome_cookies
- post/multi/gather/dns_bruteforce
- post/multi/gather/dns_reverse_lookup
- post/multi/gather/dns_srv_lookup
- post/multi/gather/docker_creds
- post/multi/gather/enum_hexchat
- post/multi/gather/enum_software_versions
- post/multi/gather/enum_vbox
- post/multi/gather/env
- post/multi/gather/fetchmailrc_creds
- post/multi/gather/filezilla_client_cred
- post/multi/gather/find_vmx
- post/multi/gather/firefox_creds
- post/multi/gather/gpg_creds
- post/multi/gather/grub_creds
- post/multi/gather/irssi_creds
- post/multi/gather/jboss_gather
- post/multi/gather/jenkins_gather
- post/multi/gather/lastpass_creds
- post/multi/gather/maven_creds
- post/multi/gather/multi_command
- post/multi/gather/netrc_creds
- post/multi/gather/pgpass_creds
- post/multi/gather/pidgin_cred
- post/multi/gather/ping_sweep
- post/multi/gather/remmina_creds
- post/multi/gather/resolve_hosts
- post/multi/gather/rsyncd_creds
- post/multi/gather/rubygems_api_key
- post/multi/gather/run_console_rc_file
- post/multi/gather/saltstack_salt
- post/multi/gather/skype_enum
- post/multi/gather/ssh_creds
- post/multi/gather/thunderbird_creds
- post/multi/gather/tomcat_gather
- post/multi/gather/ubiquiti_unifi_backup
- post/multi/gather/unix_cached_ad_hashes
- post/multi/gather/unix_kerberos_tickets
- post/multi/gather/wlan_geolocate
Authors
- David Bloom
Version
This page has been produced using Metasploit Framework version 6.1.24-dev. For more modules, visit the Metasploit Module Library.
Go back to menu.