diff --git a/test/functional/framework/msfconsole_spec.rb b/test/functional/framework/msfconsole_spec.rb index ebbcececc1..65e10590e8 100644 --- a/test/functional/framework/msfconsole_spec.rb +++ b/test/functional/framework/msfconsole_spec.rb @@ -149,7 +149,7 @@ describe "Msfconsole" do File.open("#{@input_directory}/#{test_case.name}.rc", 'w') { |f| f.puts test_case.commands } ## Create the rspec Test Case - it "should not error on commands in: #{test_case.name}" do + it "should #{test_case.name}" do ## Gather the success / failure strings, and combine with the generics success_strings = test_case.expected_successes diff --git a/test/functional/framework/msftest/100-continue.msftest b/test/functional/framework/msftest/100_continue.msftest similarity index 84% rename from test/functional/framework/msftest/100-continue.msftest rename to test/functional/framework/msftest/100_continue.msftest index ade8391e15..5c2c73a13e 100644 --- a/test/functional/framework/msftest/100-continue.msftest +++ b/test/functional/framework/msftest/100_continue.msftest @@ -25,7 +25,7 @@ - Exploit exception: The connection was refused by the remote host + Exploit exception: The connection was refused by the remote host diff --git a/test/functional/framework/msftest/psexec.msftest b/test/functional/framework/msftest/psexec.msftest new file mode 100644 index 0000000000..fab5c2304b --- /dev/null +++ b/test/functional/framework/msftest/psexec.msftest @@ -0,0 +1,31 @@ + + + + psexec + + + This test runs psexec on a vulnerable host. + + + use windows/smb/psexec + set WORKSPACE default + set RHOST vulnerable + set SMBUser Administrator + set SMBPass + set payload windows/meterpreter/bind_tcp + set LocalOutput msfconsole_spec_working/output/psexec + exploit + exit + exit + + + + Meterpreter session 1 opened + Meterpreter session 1 closed. Reason: User exit + + + + + + +