Jacob Robles
2856c46199
Update test cases
2018-06-28 18:26:54 -05:00
Jacob Robles
dfbc72dfbc
Update tests
2018-06-25 15:06:23 -05:00
Brent Cook
60bed4bd1b
tidy tests, add ms17_010_psexec
2018-05-08 17:44:08 -05:00
Brent Cook
0c391c4003
reduce sleeps for a test we're running on every PR
2018-05-07 06:55:02 -05:00
Brent Cook
ad78ee347b
run json files through 'python -m json.tool'
2018-05-07 00:29:23 -05:00
Brent Cook
4de2dc5f8c
don't disable smbv1 just yet
2018-05-07 00:24:38 -05:00
dmohanty-r7
7fa001ba50
Add tests for test lab
2018-05-07 00:24:38 -05:00
Jeffrey Martin
cacb9af731
update test for CPE abstraction
2018-03-13 16:13:04 -05:00
Jeffrey Martin
bb0d5ba8da
decouple hosts and targets for tests
2018-02-25 17:10:22 -06:00
Jeffrey Martin
cf4d9130a9
add initial module automation tests
2017-12-05 11:19:24 -06:00
Brent Cook
6300758c46
use https for metaploit.com links
2017-07-24 06:26:21 -07:00
Brent Cook
b08d1ad8d8
Revert "Land #6812 , remove broken OSVDB references"
...
This reverts commit 2b016e0216
, reversing
changes made to 7b1d9596c7
.
2016-07-15 12:00:31 -05:00
wchen-r7
816bc91e45
Resolve #6807 , remove all OSVDB references.
...
OSVDB is no longer a vulnerability database, therefore all the
references linked to it are invalid.
Resolve #6807
2016-04-23 12:32:34 -05:00
Brent Cook
da039e136a
update test modules to use MetasploitModule
2016-03-13 13:44:44 -05:00
jvazquez-r7
4224008709
Delete print_debug/vprint_debug
2015-04-21 11:14:03 -05:00
Brent Cook
8b3a0a0bb1
really fix the cmdweb test
...
this test to include the CmdStager module, not the CmdStagerVbs class
Before:
```
msf > loadpath test/modules
Loaded 32 modules:
8 posts
12 auxiliarys
12 exploits
```
After:
```
msf > loadpath test/modules
Loaded 33 modules:
8 posts
12 auxiliarys
13 exploits
msf > use exploit/test/cmdweb
msf exploit(cmdweb) > info
Name: Command Stager Web Test
Module: exploit/test/cmdweb
Platform: Windows
Privileged: Yes
License: Metasploit Framework License (BSD)
Rank: Manual
Disclosed: 2010-02-03
Provided by:
bannedit <bannedit@metasploit.com>
Available targets:
Id Name
-- ----
0 Automatic Targeting
Basic options:
Name Current Setting Required Description
---- --------------- -------- -----------
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
RHOST yes The target address
RPORT 8080 yes The target port
VHOST no HTTP server virtual host
Payload information:
Description:
This module tests the command stager mixin against a shell.jsp
application installed on an Apache Tomcat server.
msf exploit(cmdweb) > set RHOST 127.0.0.1
RHOST => 127.0.0.1
msf exploit(cmdweb) > run
[*] Started reverse handler on 127.0.0.1:4444
[*] Command Stager progress - 2.01% done (2046/101881 bytes)
[*] Command Stager progress - 4.02% done (4092/101881 bytes)
[*] Command Stager progress - 6.02% done (6138/101881 bytes)
[*] Command Stager progress - 8.03% done (8184/101881 bytes)
[*] Command Stager progress - 10.04% done (10230/101881 bytes)
[*] Command Stager progress - 12.05% done (12276/101881 bytes)
[*] Command Stager progress - 14.06% done (14322/101881 bytes)
[*] Command Stager progress - 16.07% done (16368/101881 bytes)
[*] Command Stager progress - 18.07% done (18414/101881 bytes)
...
```
2015-01-27 11:44:34 -06:00
Brent Cook
c96c8a03cf
CmdStagerVBS is now in Rex::Exploitation
...
```
$ ./msfconsole -qx "loadpath test/modules/; exit"
Loaded 32 modules:
12 auxiliarys
12 exploits
8 posts
```
2015-01-07 13:31:15 -06:00
URI Assassin
35d3bbf74d
Fix up comment splats with the correct URI
...
See the complaint on #4039 . This doesn't fix that particular
issue (it's somewhat unrelated), but does solve around
a file parsing problem reported by @void-in
2014-10-17 11:47:33 -05:00
Joshua Smith
6884c87cfa
removes IDs/Revisions, resplats test/modules
2014-08-04 01:04:23 -05:00
jvazquez-r7
ce02f8a7c5
Allow easier control of sprayed memory
2014-03-28 11:58:41 -05:00
jvazquez-r7
0523d9e625
Add comments
2014-03-28 11:09:39 -05:00
jvazquez-r7
04bfe55ae0
Add test modules
2014-03-28 11:09:10 -05:00
sinn3r
5d10b44430
Add support for Silverlight
...
Add support for Silverlight exploitation. [SeeRM #8705 ]
2013-11-26 14:47:27 -06:00
sinn3r
d9d04fa3a3
Correct test file
2013-11-07 00:59:00 -06:00
sinn3r
b34b4ac2b6
Update the java stuff again
2013-11-07 00:57:20 -06:00
sinn3r
991240a87e
Support java version detection
2013-11-07 00:54:52 -06:00
sinn3r
3e1771aa77
Being able to pass binding when we need to
2013-11-07 00:12:29 -06:00
sinn3r
c338f7a8c0
Change how requirements are defined, rspec, etc
2013-11-06 14:01:29 -06:00
sinn3r
65c96a1f45
Allow the module to be target specific
2013-11-06 00:57:53 -06:00
sinn3r
73701462ed
Fix ActiveX. Use ERB for Javascript detection code.
2013-11-05 16:26:41 -06:00
sinn3r
054a525f35
Change profile data structure
2013-11-04 17:46:36 -06:00
sinn3r
a806b1aa5e
Update test example
2013-11-01 12:11:49 -05:00
sinn3r
735b879e3c
Add an example/testcase for BrowserExploitServer
2013-10-31 13:18:45 -05:00
Tod Beardsley
ec70861050
Msftidy for test modules? Why not
2013-10-23 16:06:19 -05:00
Tod Beardsley
a554784d59
Add @wchen-r7's test module to the test dir
...
See the referenced gist on #2545
2013-10-23 16:01:13 -05:00
Tab Assassin
2e8d19edcf
Retab all the things (except external/)
2013-09-30 13:47:53 -05:00
Tod Beardsley
eeea1d9109
Regression test for check in exploits
2013-05-23 11:46:16 -05:00
James Lee
2b8024d538
Add a simple module for testing cmd payloads
2012-06-18 16:51:40 -06:00
James Lee
4cd329a943
Spawn the payload as a seperate process
...
Running the payload using system() in a thread was causing some weird
interactions with ctrl-c. Fix those issues by using Process.spawn and
Process.detach. I suspect this was the original cause of #3631 , java
meterpreter sessions dying unaccountably.
See #3631
2011-12-31 12:11:34 -07:00
James Lee
3d52c5c4c0
add target info for generic so reloading gets correct compatible payloads
...
git-svn-id: file:///home/svn/framework3/trunk@11354 4d416f70-5f16-0410-b530-b9f4589650da
2010-12-16 20:18:06 +00:00
Joshua Drake
f687a3460c
move all test modules (aux/exploits) into test/modules directory, use loadpath to load them
...
git-svn-id: file:///home/svn/framework3/trunk@11218 4d416f70-5f16-0410-b530-b9f4589650da
2010-12-04 01:59:24 +00:00