run json files through 'python -m json.tool'

GSoC/Meterpreter_Web_Console
Brent Cook 2018-05-07 00:29:23 -05:00
parent 3e7e1e59df
commit ad78ee347b
3 changed files with 217 additions and 235 deletions

View File

@ -1,68 +1,62 @@
{
"TEST_NAME": "smb_enumshares test",
"REPORT_PREFIX": "SmbEnumSharesTest",
"FRAMEWORK_BRANCH": "upstream/master",
"HTTP_PORT": 5309,
"STARTING_LISTENER": 30000,
"CREDS_FILE": "../JSON/creds.json",
"MSF_HOSTS":
[
{
"TYPE": "VIRTUAL",
"METHOD": "VM_TOOLS_UPLOAD",
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
"CPE": "cpe:/a:rapid7:metasploit:::",
"MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
"MSF_PATH": "/home/msfuser/rapid7/metasploit-framework"
}
],
"TARGETS":
[
{
"TYPE": "VIRTUAL",
"METHOD": "EXPLOIT",
"CPE": "cpe:/o:microsoft:windows_server_2008:r2:sp1:x64",
"MODULES":
[
{
"NAME": "auxiliary/scanner/smb/smb_enumshares",
"SETTINGS": [
"smbuser=vagrant",
"smbpass=vagrant"
]
}
]
},
{
"TYPE": "VIRTUAL",
"METHOD": "EXPLOIT",
"CPE": "cpe:/o:microsoft:windows_server_2016:::x64",
"MODULES":
[
{
"NAME": "auxiliary/scanner/smb/smb_enumshares",
"SETTINGS": [
"smbuser=vagrant",
"smbpass=vagrant"
]
}
]
}
],
"TARGET_GLOBALS":
{
"TYPE": "VIRTUAL",
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
"METHOD": "VM_TOOLS_UPLOAD",
"PAYLOAD_DIRECTORY": "C:\\payload_test",
"TESTING_SNAPSHOT": "TESTING_BASE",
"PYTHON": "C:\\software\\x86\\python27\\python.exe",
"METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
"METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe"
},
"COMMAND_LIST": [],
"SUCCESS_LIST": [
"IPC$"
]
}
{
"COMMAND_LIST": [],
"CREDS_FILE": "../JSON/creds.json",
"FRAMEWORK_BRANCH": "upstream/master",
"HTTP_PORT": 5309,
"MSF_HOSTS": [
{
"CPE": "cpe:/a:rapid7:metasploit:::",
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
"METHOD": "VM_TOOLS_UPLOAD",
"MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
"MSF_PATH": "/home/msfuser/rapid7/metasploit-framework",
"TYPE": "VIRTUAL"
}
],
"REPORT_PREFIX": "SmbEnumSharesTest",
"STARTING_LISTENER": 30000,
"SUCCESS_LIST": [
"IPC$"
],
"TARGETS": [
{
"CPE": "cpe:/o:microsoft:windows_server_2008:r2:sp1:x64",
"METHOD": "EXPLOIT",
"MODULES": [
{
"NAME": "auxiliary/scanner/smb/smb_enumshares",
"SETTINGS": [
"smbuser=vagrant",
"smbpass=vagrant"
]
}
],
"TYPE": "VIRTUAL"
},
{
"CPE": "cpe:/o:microsoft:windows_server_2016:::x64",
"METHOD": "EXPLOIT",
"MODULES": [
{
"NAME": "auxiliary/scanner/smb/smb_enumshares",
"SETTINGS": [
"smbuser=vagrant",
"smbpass=vagrant"
]
}
],
"TYPE": "VIRTUAL"
}
],
"TARGET_GLOBALS": {
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
"METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe",
"METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
"METHOD": "VM_TOOLS_UPLOAD",
"PAYLOAD_DIRECTORY": "C:\\payload_test",
"PYTHON": "C:\\software\\x86\\python27\\python.exe",
"TESTING_SNAPSHOT": "TESTING_BASE",
"TYPE": "VIRTUAL"
},
"TEST_NAME": "smb_enumshares test"
}

View File

@ -1,68 +1,62 @@
{
"TEST_NAME": "smb_enumusers test",
"REPORT_PREFIX": "SmbEnumUsersTest",
"FRAMEWORK_BRANCH": "upstream/master",
"HTTP_PORT": 5309,
"STARTING_LISTENER": 30000,
"CREDS_FILE": "../JSON/creds.json",
"MSF_HOSTS":
[
{
"TYPE": "VIRTUAL",
"METHOD": "VM_TOOLS_UPLOAD",
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
"CPE": "cpe:/a:rapid7:metasploit:::",
"MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
"MSF_PATH": "/home/msfuser/rapid7/metasploit-framework"
}
],
"TARGETS":
[
{
"TYPE": "VIRTUAL",
"METHOD": "EXPLOIT",
"CPE": "cpe:/o:microsoft:windows_server_2008:r2:sp1:x64",
"MODULES":
[
{
"NAME": "auxiliary/scanner/smb/smb_enumusers",
"SETTINGS": [
"smbuser=vagrant",
"smbpass=vagrant"
]
}
]
},
{
"TYPE": "VIRTUAL",
"METHOD": "EXPLOIT",
"CPE": "cpe:/o:microsoft:windows_server_2016:::x64",
"MODULES":
[
{
"NAME": "auxiliary/scanner/smb/smb_enumusers",
"SETTINGS": [
"smbuser=vagrant",
"smbpass=vagrant"
]
}
]
}
],
"TARGET_GLOBALS":
{
"TYPE": "VIRTUAL",
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
"METHOD": "VM_TOOLS_UPLOAD",
"PAYLOAD_DIRECTORY": "C:\\payload_test",
"TESTING_SNAPSHOT": "TESTING_BASE",
"PYTHON": "C:\\software\\x86\\python27\\python.exe",
"METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
"METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe"
},
"COMMAND_LIST": [],
"SUCCESS_LIST": [
"Administrator"
]
}
{
"COMMAND_LIST": [],
"CREDS_FILE": "../JSON/creds.json",
"FRAMEWORK_BRANCH": "upstream/master",
"HTTP_PORT": 5309,
"MSF_HOSTS": [
{
"CPE": "cpe:/a:rapid7:metasploit:::",
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
"METHOD": "VM_TOOLS_UPLOAD",
"MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
"MSF_PATH": "/home/msfuser/rapid7/metasploit-framework",
"TYPE": "VIRTUAL"
}
],
"REPORT_PREFIX": "SmbEnumUsersTest",
"STARTING_LISTENER": 30000,
"SUCCESS_LIST": [
"Administrator"
],
"TARGETS": [
{
"CPE": "cpe:/o:microsoft:windows_server_2008:r2:sp1:x64",
"METHOD": "EXPLOIT",
"MODULES": [
{
"NAME": "auxiliary/scanner/smb/smb_enumusers",
"SETTINGS": [
"smbuser=vagrant",
"smbpass=vagrant"
]
}
],
"TYPE": "VIRTUAL"
},
{
"CPE": "cpe:/o:microsoft:windows_server_2016:::x64",
"METHOD": "EXPLOIT",
"MODULES": [
{
"NAME": "auxiliary/scanner/smb/smb_enumusers",
"SETTINGS": [
"smbuser=vagrant",
"smbpass=vagrant"
]
}
],
"TYPE": "VIRTUAL"
}
],
"TARGET_GLOBALS": {
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
"METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe",
"METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
"METHOD": "VM_TOOLS_UPLOAD",
"PAYLOAD_DIRECTORY": "C:\\payload_test",
"PYTHON": "C:\\software\\x86\\python27\\python.exe",
"TESTING_SNAPSHOT": "TESTING_BASE",
"TYPE": "VIRTUAL"
},
"TEST_NAME": "smb_enumusers test"
}

View File

@ -1,99 +1,93 @@
{
"FRAMEWORK_BRANCH": "upstream/master",
"HTTP_PORT": 5309,
"STARTING_LISTENER": 30000,
"CREDS_FILE": "../JSON/creds.json",
"MSF_HOSTS":
[
{
"TYPE": "VIRTUAL",
"METHOD": "VM_TOOLS_UPLOAD",
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
"CPE": "cpe:/a:rapid7:metasploit:::",
"MSF_PATH": "/home/msfuser/rapid7/metasploit-framework",
"MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts"
}
],
"TARGET_GLOBALS":
{
"TYPE": "VIRTUAL",
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
"METHOD": "EXPLOIT",
"PAYLOAD_DIRECTORY": "C:\\payload_test",
"PYTHON": "C:\\software\\x86\\python27\\python.exe",
"METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
"METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe"
},
"TARGETS":
[
{
"CPE": "cpe:/o:microsoft:windows_7:::x64"
},
{
"CPE": "cpe:/o:microsoft:windows_10:::x64"
}
],
"MODULES":
[
{
"NAME": "exploit/windows/smb/psexec",
"SETTINGS":
[
"SMBUser=vagrant",
"SMBPass=vagrant"
]
}
],
"PAYLOADS":
[
{
"NAME": "windows/x64/meterpreter/reverse_tcp",
"SETTINGS": []
}
],
"COMMAND_LIST": [
"<ruby>",
"sleep(60)",
"</ruby>",
"sessions -C sessions -l",
"<ruby>",
"sleep(60)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"sessions -C ifconfig",
"sessions -C sessions -l",
"sessions -C getuid",
"sessions -C exit"
],
"SUCCESS_LIST": [
"Session 1 created in the background"
]
}
{
"COMMAND_LIST": [
"<ruby>",
"sleep(60)",
"</ruby>",
"sessions -C sessions -l",
"<ruby>",
"sleep(60)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"<ruby>",
"sleep(10)",
"</ruby>",
"sessions -C sysinfo",
"sessions -C ifconfig",
"sessions -C sessions -l",
"sessions -C getuid",
"sessions -C exit"
],
"CREDS_FILE": "../JSON/creds.json",
"FRAMEWORK_BRANCH": "upstream/master",
"HTTP_PORT": 5309,
"MODULES": [
{
"NAME": "exploit/windows/smb/psexec",
"SETTINGS": [
"SMBUser=vagrant",
"SMBPass=vagrant"
]
}
],
"MSF_HOSTS": [
{
"CPE": "cpe:/a:rapid7:metasploit:::",
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
"METHOD": "VM_TOOLS_UPLOAD",
"MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
"MSF_PATH": "/home/msfuser/rapid7/metasploit-framework",
"TYPE": "VIRTUAL"
}
],
"PAYLOADS": [
{
"NAME": "windows/x64/meterpreter/reverse_tcp",
"SETTINGS": []
}
],
"STARTING_LISTENER": 30000,
"SUCCESS_LIST": [
"Session 1 created in the background"
],
"TARGETS": [
{
"CPE": "cpe:/o:microsoft:windows_7:::x64"
},
{
"CPE": "cpe:/o:microsoft:windows_10:::x64"
}
],
"TARGET_GLOBALS": {
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
"METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe",
"METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
"METHOD": "EXPLOIT",
"PAYLOAD_DIRECTORY": "C:\\payload_test",
"PYTHON": "C:\\software\\x86\\python27\\python.exe",
"TYPE": "VIRTUAL"
}
}