{ "COMMAND_LIST": [ "sessions -C sessions -l", "sessions -C sysinfo", "sessions -C exit" ], "CREDS_FILE": "../JSON/creds.json", "FRAMEWORK_BRANCH": "upstream/master", "HTTP_PORT": 5309, "MODULES": [ { "NAME": "exploit/windows/smb/psexec", "SETTINGS": [ "SMBUser=vagrant", "SMBPass=vagrant", "TARGET=0" ] } ], "MSF_HOSTS": [ { "CPE": "cpe:/a:rapid7:metasploit:::", "HYPERVISOR_CONFIG": "../JSON/esxi_config.json", "METHOD": "VM_TOOLS_UPLOAD", "MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts", "MSF_PATH": "/home/msfuser/rapid7/metasploit-framework", "TYPE": "VIRTUAL" } ], "PAYLOADS": [ { "NAME": "windows/x64/meterpreter/reverse_tcp", "SETTINGS": [] } ], "STARTING_LISTENER": 30000, "SUCCESS_LIST": [ "Session 1 created in the background" ], "TARGETS": [ { "CPE": "cpe:/o:microsoft:windows_7:::x64" }, { "CPE": "cpe:/o:microsoft:windows_10:::x64" }, { "CPE": "cpe:/o:microsoft:windows_8.1::sp1:x64" }, { "CPE": "cpe:/o:microsoft:windows_server_2008:r2:sp1:x64" }, { "CPE": "cpe:/o:microsoft:windows_7::sp1:x64", "TESTING_SNAPSHOT": "DisableSMBv1" }, { "CPE": "cpe:/o:microsoft:windows_10:1607::x64", "TESTING_SNAPSHOT": "DisableSMBv1" }, { "CPE": "cpe:/o:microsoft:windows_8.1:::x64", "TESTING_SNAPSHOT": "DisableSMBv1" }, { "CPE": "cpe:/o:microsoft:windows_server_2008::r2:x64", "TESTING_SNAPSHOT": "DisableSMBv1" } ], "TARGET_GLOBALS": { "HYPERVISOR_CONFIG": "../JSON/esxi_config.json", "METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe", "METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe", "METHOD": "EXPLOIT", "PAYLOAD_DIRECTORY": "C:\\payload_test", "PYTHON": "C:\\software\\x86\\python27\\python.exe", "TYPE": "VIRTUAL" } }