diff --git a/test/modules/auxiliary/scanner/smb/smb_enumshares.json b/test/modules/auxiliary/scanner/smb/smb_enumshares.json
index db9ba7493f..3e2e363cbe 100644
--- a/test/modules/auxiliary/scanner/smb/smb_enumshares.json
+++ b/test/modules/auxiliary/scanner/smb/smb_enumshares.json
@@ -1,68 +1,62 @@
-{
- "TEST_NAME": "smb_enumshares test",
- "REPORT_PREFIX": "SmbEnumSharesTest",
- "FRAMEWORK_BRANCH": "upstream/master",
- "HTTP_PORT": 5309,
- "STARTING_LISTENER": 30000,
- "CREDS_FILE": "../JSON/creds.json",
- "MSF_HOSTS":
- [
- {
- "TYPE": "VIRTUAL",
- "METHOD": "VM_TOOLS_UPLOAD",
- "HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
- "CPE": "cpe:/a:rapid7:metasploit:::",
- "MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
- "MSF_PATH": "/home/msfuser/rapid7/metasploit-framework"
- }
- ],
-
- "TARGETS":
- [
- {
- "TYPE": "VIRTUAL",
- "METHOD": "EXPLOIT",
- "CPE": "cpe:/o:microsoft:windows_server_2008:r2:sp1:x64",
- "MODULES":
- [
- {
- "NAME": "auxiliary/scanner/smb/smb_enumshares",
- "SETTINGS": [
- "smbuser=vagrant",
- "smbpass=vagrant"
- ]
- }
- ]
- },
- {
- "TYPE": "VIRTUAL",
- "METHOD": "EXPLOIT",
- "CPE": "cpe:/o:microsoft:windows_server_2016:::x64",
- "MODULES":
- [
- {
- "NAME": "auxiliary/scanner/smb/smb_enumshares",
- "SETTINGS": [
- "smbuser=vagrant",
- "smbpass=vagrant"
- ]
- }
- ]
- }
- ],
- "TARGET_GLOBALS":
- {
- "TYPE": "VIRTUAL",
- "HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
- "METHOD": "VM_TOOLS_UPLOAD",
- "PAYLOAD_DIRECTORY": "C:\\payload_test",
- "TESTING_SNAPSHOT": "TESTING_BASE",
- "PYTHON": "C:\\software\\x86\\python27\\python.exe",
- "METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
- "METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe"
- },
- "COMMAND_LIST": [],
- "SUCCESS_LIST": [
- "IPC$"
- ]
-}
+{
+ "COMMAND_LIST": [],
+ "CREDS_FILE": "../JSON/creds.json",
+ "FRAMEWORK_BRANCH": "upstream/master",
+ "HTTP_PORT": 5309,
+ "MSF_HOSTS": [
+ {
+ "CPE": "cpe:/a:rapid7:metasploit:::",
+ "HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
+ "METHOD": "VM_TOOLS_UPLOAD",
+ "MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
+ "MSF_PATH": "/home/msfuser/rapid7/metasploit-framework",
+ "TYPE": "VIRTUAL"
+ }
+ ],
+ "REPORT_PREFIX": "SmbEnumSharesTest",
+ "STARTING_LISTENER": 30000,
+ "SUCCESS_LIST": [
+ "IPC$"
+ ],
+ "TARGETS": [
+ {
+ "CPE": "cpe:/o:microsoft:windows_server_2008:r2:sp1:x64",
+ "METHOD": "EXPLOIT",
+ "MODULES": [
+ {
+ "NAME": "auxiliary/scanner/smb/smb_enumshares",
+ "SETTINGS": [
+ "smbuser=vagrant",
+ "smbpass=vagrant"
+ ]
+ }
+ ],
+ "TYPE": "VIRTUAL"
+ },
+ {
+ "CPE": "cpe:/o:microsoft:windows_server_2016:::x64",
+ "METHOD": "EXPLOIT",
+ "MODULES": [
+ {
+ "NAME": "auxiliary/scanner/smb/smb_enumshares",
+ "SETTINGS": [
+ "smbuser=vagrant",
+ "smbpass=vagrant"
+ ]
+ }
+ ],
+ "TYPE": "VIRTUAL"
+ }
+ ],
+ "TARGET_GLOBALS": {
+ "HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
+ "METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe",
+ "METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
+ "METHOD": "VM_TOOLS_UPLOAD",
+ "PAYLOAD_DIRECTORY": "C:\\payload_test",
+ "PYTHON": "C:\\software\\x86\\python27\\python.exe",
+ "TESTING_SNAPSHOT": "TESTING_BASE",
+ "TYPE": "VIRTUAL"
+ },
+ "TEST_NAME": "smb_enumshares test"
+}
diff --git a/test/modules/auxiliary/scanner/smb/smb_enumusers.json b/test/modules/auxiliary/scanner/smb/smb_enumusers.json
index 6e3e2bd416..2727ab7b2d 100644
--- a/test/modules/auxiliary/scanner/smb/smb_enumusers.json
+++ b/test/modules/auxiliary/scanner/smb/smb_enumusers.json
@@ -1,68 +1,62 @@
-{
- "TEST_NAME": "smb_enumusers test",
- "REPORT_PREFIX": "SmbEnumUsersTest",
- "FRAMEWORK_BRANCH": "upstream/master",
- "HTTP_PORT": 5309,
- "STARTING_LISTENER": 30000,
- "CREDS_FILE": "../JSON/creds.json",
- "MSF_HOSTS":
- [
- {
- "TYPE": "VIRTUAL",
- "METHOD": "VM_TOOLS_UPLOAD",
- "HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
- "CPE": "cpe:/a:rapid7:metasploit:::",
- "MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
- "MSF_PATH": "/home/msfuser/rapid7/metasploit-framework"
- }
- ],
-
- "TARGETS":
- [
- {
- "TYPE": "VIRTUAL",
- "METHOD": "EXPLOIT",
- "CPE": "cpe:/o:microsoft:windows_server_2008:r2:sp1:x64",
- "MODULES":
- [
- {
- "NAME": "auxiliary/scanner/smb/smb_enumusers",
- "SETTINGS": [
- "smbuser=vagrant",
- "smbpass=vagrant"
- ]
- }
- ]
- },
- {
- "TYPE": "VIRTUAL",
- "METHOD": "EXPLOIT",
- "CPE": "cpe:/o:microsoft:windows_server_2016:::x64",
- "MODULES":
- [
- {
- "NAME": "auxiliary/scanner/smb/smb_enumusers",
- "SETTINGS": [
- "smbuser=vagrant",
- "smbpass=vagrant"
- ]
- }
- ]
- }
- ],
- "TARGET_GLOBALS":
- {
- "TYPE": "VIRTUAL",
- "HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
- "METHOD": "VM_TOOLS_UPLOAD",
- "PAYLOAD_DIRECTORY": "C:\\payload_test",
- "TESTING_SNAPSHOT": "TESTING_BASE",
- "PYTHON": "C:\\software\\x86\\python27\\python.exe",
- "METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
- "METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe"
- },
- "COMMAND_LIST": [],
- "SUCCESS_LIST": [
- "Administrator"
- ]
-}
+{
+ "COMMAND_LIST": [],
+ "CREDS_FILE": "../JSON/creds.json",
+ "FRAMEWORK_BRANCH": "upstream/master",
+ "HTTP_PORT": 5309,
+ "MSF_HOSTS": [
+ {
+ "CPE": "cpe:/a:rapid7:metasploit:::",
+ "HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
+ "METHOD": "VM_TOOLS_UPLOAD",
+ "MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
+ "MSF_PATH": "/home/msfuser/rapid7/metasploit-framework",
+ "TYPE": "VIRTUAL"
+ }
+ ],
+ "REPORT_PREFIX": "SmbEnumUsersTest",
+ "STARTING_LISTENER": 30000,
+ "SUCCESS_LIST": [
+ "Administrator"
+ ],
+ "TARGETS": [
+ {
+ "CPE": "cpe:/o:microsoft:windows_server_2008:r2:sp1:x64",
+ "METHOD": "EXPLOIT",
+ "MODULES": [
+ {
+ "NAME": "auxiliary/scanner/smb/smb_enumusers",
+ "SETTINGS": [
+ "smbuser=vagrant",
+ "smbpass=vagrant"
+ ]
+ }
+ ],
+ "TYPE": "VIRTUAL"
+ },
+ {
+ "CPE": "cpe:/o:microsoft:windows_server_2016:::x64",
+ "METHOD": "EXPLOIT",
+ "MODULES": [
+ {
+ "NAME": "auxiliary/scanner/smb/smb_enumusers",
+ "SETTINGS": [
+ "smbuser=vagrant",
+ "smbpass=vagrant"
+ ]
+ }
+ ],
+ "TYPE": "VIRTUAL"
+ }
+ ],
+ "TARGET_GLOBALS": {
+ "HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
+ "METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe",
+ "METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
+ "METHOD": "VM_TOOLS_UPLOAD",
+ "PAYLOAD_DIRECTORY": "C:\\payload_test",
+ "PYTHON": "C:\\software\\x86\\python27\\python.exe",
+ "TESTING_SNAPSHOT": "TESTING_BASE",
+ "TYPE": "VIRTUAL"
+ },
+ "TEST_NAME": "smb_enumusers test"
+}
diff --git a/test/modules/exploits/windows/smb/psexec.json b/test/modules/exploits/windows/smb/psexec.json
index 3cecc852ab..186fdf8607 100644
--- a/test/modules/exploits/windows/smb/psexec.json
+++ b/test/modules/exploits/windows/smb/psexec.json
@@ -1,99 +1,93 @@
-{
- "FRAMEWORK_BRANCH": "upstream/master",
- "HTTP_PORT": 5309,
- "STARTING_LISTENER": 30000,
- "CREDS_FILE": "../JSON/creds.json",
- "MSF_HOSTS":
- [
- {
- "TYPE": "VIRTUAL",
- "METHOD": "VM_TOOLS_UPLOAD",
- "HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
- "CPE": "cpe:/a:rapid7:metasploit:::",
- "MSF_PATH": "/home/msfuser/rapid7/metasploit-framework",
- "MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts"
- }
- ],
- "TARGET_GLOBALS":
- {
- "TYPE": "VIRTUAL",
- "HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
- "METHOD": "EXPLOIT",
- "PAYLOAD_DIRECTORY": "C:\\payload_test",
- "PYTHON": "C:\\software\\x86\\python27\\python.exe",
- "METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
- "METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe"
- },
- "TARGETS":
- [
- {
- "CPE": "cpe:/o:microsoft:windows_7:::x64"
- },
- {
- "CPE": "cpe:/o:microsoft:windows_10:::x64"
- }
- ],
- "MODULES":
- [
- {
- "NAME": "exploit/windows/smb/psexec",
- "SETTINGS":
- [
- "SMBUser=vagrant",
- "SMBPass=vagrant"
- ]
- }
- ],
- "PAYLOADS":
- [
- {
- "NAME": "windows/x64/meterpreter/reverse_tcp",
- "SETTINGS": []
- }
- ],
- "COMMAND_LIST": [
- "",
- "sleep(60)",
- "",
- "sessions -C sessions -l",
- "",
- "sleep(60)",
- "",
- "sessions -C sysinfo",
- "",
- "sleep(10)",
- "",
- "sessions -C sysinfo",
- "",
- "sleep(10)",
- "",
- "sessions -C sysinfo",
- "",
- "sleep(10)",
- "",
- "sessions -C sysinfo",
- "",
- "sleep(10)",
- "",
- "sessions -C sysinfo",
- "",
- "sleep(10)",
- "",
- "sessions -C sysinfo",
- "",
- "sleep(10)",
- "",
- "sessions -C sysinfo",
- "",
- "sleep(10)",
- "",
- "sessions -C sysinfo",
- "sessions -C ifconfig",
- "sessions -C sessions -l",
- "sessions -C getuid",
- "sessions -C exit"
- ],
- "SUCCESS_LIST": [
- "Session 1 created in the background"
- ]
-}
+{
+ "COMMAND_LIST": [
+ "",
+ "sleep(60)",
+ "",
+ "sessions -C sessions -l",
+ "",
+ "sleep(60)",
+ "",
+ "sessions -C sysinfo",
+ "",
+ "sleep(10)",
+ "",
+ "sessions -C sysinfo",
+ "",
+ "sleep(10)",
+ "",
+ "sessions -C sysinfo",
+ "",
+ "sleep(10)",
+ "",
+ "sessions -C sysinfo",
+ "",
+ "sleep(10)",
+ "",
+ "sessions -C sysinfo",
+ "",
+ "sleep(10)",
+ "",
+ "sessions -C sysinfo",
+ "",
+ "sleep(10)",
+ "",
+ "sessions -C sysinfo",
+ "",
+ "sleep(10)",
+ "",
+ "sessions -C sysinfo",
+ "sessions -C ifconfig",
+ "sessions -C sessions -l",
+ "sessions -C getuid",
+ "sessions -C exit"
+ ],
+ "CREDS_FILE": "../JSON/creds.json",
+ "FRAMEWORK_BRANCH": "upstream/master",
+ "HTTP_PORT": 5309,
+ "MODULES": [
+ {
+ "NAME": "exploit/windows/smb/psexec",
+ "SETTINGS": [
+ "SMBUser=vagrant",
+ "SMBPass=vagrant"
+ ]
+ }
+ ],
+ "MSF_HOSTS": [
+ {
+ "CPE": "cpe:/a:rapid7:metasploit:::",
+ "HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
+ "METHOD": "VM_TOOLS_UPLOAD",
+ "MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
+ "MSF_PATH": "/home/msfuser/rapid7/metasploit-framework",
+ "TYPE": "VIRTUAL"
+ }
+ ],
+ "PAYLOADS": [
+ {
+ "NAME": "windows/x64/meterpreter/reverse_tcp",
+ "SETTINGS": []
+ }
+ ],
+ "STARTING_LISTENER": 30000,
+ "SUCCESS_LIST": [
+ "Session 1 created in the background"
+ ],
+ "TARGETS": [
+ {
+ "CPE": "cpe:/o:microsoft:windows_7:::x64"
+ },
+ {
+ "CPE": "cpe:/o:microsoft:windows_10:::x64"
+ }
+ ],
+ "TARGET_GLOBALS": {
+ "HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
+ "METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe",
+ "METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
+ "METHOD": "EXPLOIT",
+ "PAYLOAD_DIRECTORY": "C:\\payload_test",
+ "PYTHON": "C:\\software\\x86\\python27\\python.exe",
+ "TYPE": "VIRTUAL"
+ }
+}