Land #9994, tidy tests, add ms17_010_psexec
parent
b2b97db28b
commit
bbbd81bf1f
|
@ -1,99 +1,58 @@
|
|||
{
|
||||
"FRAMEWORK_BRANCH": "upstream/master",
|
||||
"HTTP_PORT": 5309,
|
||||
"STARTING_LISTENER": 30000,
|
||||
"CREDS_FILE": "../JSON/creds.json",
|
||||
"MSF_HOSTS":
|
||||
[
|
||||
{
|
||||
"TYPE": "VIRTUAL",
|
||||
"METHOD": "VM_TOOLS_UPLOAD",
|
||||
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
|
||||
"CPE": "cpe:/a:rapid7:metasploit:::",
|
||||
"MSF_PATH": "/home/msfuser/rapid7/metasploit-framework",
|
||||
"MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts"
|
||||
}
|
||||
],
|
||||
"TARGET_GLOBALS":
|
||||
{
|
||||
"TYPE": "VIRTUAL",
|
||||
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
|
||||
"METHOD": "VM_TOOLS_UPLOAD",
|
||||
"PAYLOAD_DIRECTORY": "C:\\payload_test",
|
||||
"TESTING_SNAPSHOT": "TESTING_BASE",
|
||||
"PYTHON": "C:\\software\\x86\\python27\\python.exe",
|
||||
"METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
|
||||
"METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe"
|
||||
},
|
||||
"TARGETS":
|
||||
[
|
||||
{
|
||||
"TYPE": "VIRTUAL",
|
||||
"METHOD": "EXPLOIT",
|
||||
"CPE": "cpe:/o:microsoft:windows_7:::x64"
|
||||
}
|
||||
],
|
||||
"MODULES":
|
||||
[
|
||||
{
|
||||
"NAME": "exploit/windows/smb/ms17_010_eternalblue",
|
||||
"SETTINGS":
|
||||
[
|
||||
"SMBUser=vagrant",
|
||||
"SMBPass=vagrant"
|
||||
]
|
||||
}
|
||||
],
|
||||
"PAYLOADS":
|
||||
[
|
||||
{
|
||||
"NAME": "windows/x64/meterpreter/reverse_tcp",
|
||||
"SETTINGS": []
|
||||
}
|
||||
],
|
||||
"COMMAND_LIST": [
|
||||
"<ruby>",
|
||||
"sleep(60)",
|
||||
"</ruby>",
|
||||
"sessions -C sessions -l",
|
||||
"<ruby>",
|
||||
"sleep(60)",
|
||||
"</ruby>",
|
||||
"sessions -C sysinfo",
|
||||
"<ruby>",
|
||||
"sleep(10)",
|
||||
"</ruby>",
|
||||
"sessions -C sysinfo",
|
||||
"<ruby>",
|
||||
"sleep(10)",
|
||||
"</ruby>",
|
||||
"sessions -C sysinfo",
|
||||
"<ruby>",
|
||||
"sleep(10)",
|
||||
"</ruby>",
|
||||
"sessions -C sysinfo",
|
||||
"<ruby>",
|
||||
"sleep(10)",
|
||||
"</ruby>",
|
||||
"sessions -C sysinfo",
|
||||
"<ruby>",
|
||||
"sleep(10)",
|
||||
"</ruby>",
|
||||
"sessions -C sysinfo",
|
||||
"<ruby>",
|
||||
"sleep(10)",
|
||||
"</ruby>",
|
||||
"sessions -C sysinfo",
|
||||
"<ruby>",
|
||||
"sleep(10)",
|
||||
"</ruby>",
|
||||
"sessions -C sysinfo",
|
||||
"sessions -C ifconfig",
|
||||
"sessions -C sessions -l",
|
||||
"sessions -C getuid",
|
||||
"sessions -C exit"
|
||||
],
|
||||
"SUCCESS_LIST": [
|
||||
"Session 1 created in the background"
|
||||
"CREDS_FILE": "../JSON/creds.json",
|
||||
"FRAMEWORK_BRANCH": "upstream/master",
|
||||
"HTTP_PORT": 5309,
|
||||
"MODULES": [
|
||||
{
|
||||
"NAME": "exploit/windows/smb/ms17_010_eternalblue",
|
||||
"SETTINGS": [
|
||||
"SMBUser=vagrant",
|
||||
"SMBPass=vagrant"
|
||||
]
|
||||
}
|
||||
],
|
||||
"MSF_HOSTS": [
|
||||
{
|
||||
"CPE": "cpe:/a:rapid7:metasploit:::",
|
||||
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
|
||||
"METHOD": "VM_TOOLS_UPLOAD",
|
||||
"MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
|
||||
"MSF_PATH": "/home/msfuser/rapid7/metasploit-framework",
|
||||
"TYPE": "VIRTUAL"
|
||||
}
|
||||
],
|
||||
"PAYLOADS": [
|
||||
{
|
||||
"NAME": "windows/x64/meterpreter/reverse_tcp",
|
||||
"SETTINGS": []
|
||||
}
|
||||
],
|
||||
"STARTING_LISTENER": 30000,
|
||||
"SUCCESS_LIST": [
|
||||
"Session 1 created in the background"
|
||||
],
|
||||
"TARGETS": [
|
||||
{
|
||||
"CPE": "cpe:/o:microsoft:windows_7:::x64",
|
||||
"METHOD": "EXPLOIT",
|
||||
"TYPE": "VIRTUAL"
|
||||
}
|
||||
],
|
||||
"TARGET_GLOBALS": {
|
||||
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
|
||||
"METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe",
|
||||
"METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
|
||||
"METHOD": "VM_TOOLS_UPLOAD",
|
||||
"PAYLOAD_DIRECTORY": "C:\\payload_test",
|
||||
"PYTHON": "C:\\software\\x86\\python27\\python.exe",
|
||||
"TESTING_SNAPSHOT": "TESTING_BASE",
|
||||
"TYPE": "VIRTUAL"
|
||||
}
|
||||
}
|
||||
|
|
|
@ -0,0 +1,58 @@
|
|||
{
|
||||
"COMMAND_LIST": [
|
||||
"sessions -C sysinfo",
|
||||
"sessions -C ifconfig",
|
||||
"sessions -C sessions -l",
|
||||
"sessions -C getuid",
|
||||
"sessions -C exit"
|
||||
],
|
||||
"CREDS_FILE": "../JSON/creds.json",
|
||||
"FRAMEWORK_BRANCH": "upstream/master",
|
||||
"HTTP_PORT": 5309,
|
||||
"MODULES": [
|
||||
{
|
||||
"NAME": "exploit/windows/smb/ms17_010_psexec",
|
||||
"SETTINGS": [
|
||||
"SMBUser=vagrant",
|
||||
"SMBPass=vagrant"
|
||||
]
|
||||
}
|
||||
],
|
||||
"MSF_HOSTS": [
|
||||
{
|
||||
"CPE": "cpe:/a:rapid7:metasploit:::",
|
||||
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
|
||||
"METHOD": "VM_TOOLS_UPLOAD",
|
||||
"MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
|
||||
"MSF_PATH": "/home/msfuser/rapid7/metasploit-framework",
|
||||
"TYPE": "VIRTUAL"
|
||||
}
|
||||
],
|
||||
"PAYLOADS": [
|
||||
{
|
||||
"NAME": "windows/x64/meterpreter/reverse_tcp",
|
||||
"SETTINGS": []
|
||||
}
|
||||
],
|
||||
"STARTING_LISTENER": 30000,
|
||||
"SUCCESS_LIST": [
|
||||
"Session 1 created in the background"
|
||||
],
|
||||
"TARGETS": [
|
||||
{
|
||||
"CPE": "cpe:/o:microsoft:windows_7:::x64",
|
||||
"METHOD": "EXPLOIT",
|
||||
"TYPE": "VIRTUAL"
|
||||
}
|
||||
],
|
||||
"TARGET_GLOBALS": {
|
||||
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
|
||||
"METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe",
|
||||
"METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
|
||||
"METHOD": "VM_TOOLS_UPLOAD",
|
||||
"PAYLOAD_DIRECTORY": "C:\\payload_test",
|
||||
"PYTHON": "C:\\software\\x86\\python27\\python.exe",
|
||||
"TESTING_SNAPSHOT": "TESTING_BASE",
|
||||
"TYPE": "VIRTUAL"
|
||||
}
|
||||
}
|
Loading…
Reference in New Issue