25 lines
1.4 KiB
Gherkin
25 lines
1.4 KiB
Gherkin
#This feature contains scenarios to test the ability to run/access payloads from the metasploit framework
|
|
|
|
Feature: I want access to Metasploit payloads
|
|
So that I can define payload options for exploits
|
|
|
|
Scenario: Verify the windows shell reverse tcp payload option in ruby
|
|
When I run msfpayload to generate a "windows/shell_reverse_tcp" on the local host
|
|
Then the output should contain "# windows/shell_reverse_tcp"
|
|
Then the output should contain "# http://www.metasploit.com"
|
|
|
|
Scenario: Verify the windows x64 shell reverse tcp payload option in ruby
|
|
When I run msfpayload to generate a "windows/x64/shell_reverse_tcp" on the local host
|
|
Then the output should contain "# windows/x64/shell_reverse_tcp"
|
|
Then the output should contain "# http://www.metasploit.com"
|
|
|
|
Scenario: Verify the linux x86 shell reverse tcp payload option in ruby
|
|
When I run msfpayload to generate a "linux/x86/shell_reverse_tcp" on the local host
|
|
Then the output should contain "# linux/x86/shell_reverse_tcp"
|
|
Then the output should contain "# http://www.metasploit.com"
|
|
|
|
Scenario: Verify the windows meterpreter reverse tcp payload can output its contents in ruby
|
|
When I run msfpayload to generate a "windows/meterpreter/reverse_tcp" on the local host
|
|
Then the output should contain "# windows/meterpreter/reverse_tcp - 290 bytes (stage 1)"
|
|
Then the output should contain "# http://www.metasploit.com"
|