CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/test/functional/framework/msftest/100_continue.msftest
Views: 11655
<xml>
<msf_test>
	<name>
		example
	</name>
	<description>
		This test will fail on upload, and should alert the user.
	</description>
	<commands>
		use windows/iis/iis_webdav_upload_asp
		set RHOST 127.0.0.1
		set RPORT 54321
		exploit
		<ruby>
			puts "werd!" ## prints to stdout :(
		</ruby>
		exit
		exit
	</commands>
	<output>
		<successes>
			<success>Uploading</success>	
			<success>Exploit exception: The connection was refused by the remote host</success>
		</successes>
		<failures>
		</failures>
		<failure_exceptions>
			<failure_exception>Exploit exception: The connection was refused by the remote host</failure_exception>
		</failure_exceptions>
	</output>
<msf_test>