metasploit-framework/scripts/resource/bap_dryrun_only.rc

10 lines
515 B
Plaintext
Raw Normal View History

<ruby>
print_status("Starting BAP...")
2015-05-31 00:29:14 +00:00
print_status("Exploits will not be actually served, but you will know which ones the clients might be vulnerable to.")
print_status("You can do 'notes -t baps.clicks' in msfconsole to track clicks and client-specific exploit info.")
run_single("use exploit/multi/browser/autopwn")
run_single("set RealList true")
run_single("set MaxSessions 0")
run_single("set Content \"Hello, this is a security test. You shouldn't have clicked on that link :-)\"")
run_single("run")
</ruby>