CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/test/modules/exploits/windows/smb/ms17_010_psexec.json
Views: 11788
1
{
2
"COMMAND_LIST": [
3
"sessions -C sysinfo",
4
"sessions -C ifconfig",
5
"sessions -C sessions -l",
6
"sessions -C getuid",
7
"sessions -C exit"
8
],
9
"CREDS_FILE": "../JSON/creds.json",
10
"FRAMEWORK_BRANCH": "upstream/master",
11
"HTTP_PORT": 5309,
12
"MODULES": [
13
{
14
"NAME": "exploit/windows/smb/ms17_010_psexec",
15
"SETTINGS": [
16
"SMBUser=vagrant",
17
"SMBPass=vagrant"
18
]
19
}
20
],
21
"MSF_HOSTS": [
22
{
23
"CPE": "cpe:/a:rapid7:metasploit:::",
24
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
25
"METHOD": "VM_TOOLS_UPLOAD",
26
"MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
27
"MSF_PATH": "/home/msfuser/rapid7/metasploit-framework",
28
"TYPE": "VIRTUAL"
29
}
30
],
31
"PAYLOADS": [
32
{
33
"NAME": "windows/x64/meterpreter/reverse_tcp",
34
"SETTINGS": []
35
}
36
],
37
"STARTING_LISTENER": 30000,
38
"SUCCESS_LIST": [
39
"Session 1 created in the background"
40
],
41
"TARGETS": [
42
{
43
"CPE": "cpe:/o:microsoft:windows_7:::x64",
44
"METHOD": "EXPLOIT",
45
"TYPE": "VIRTUAL"
46
}
47
],
48
"TARGET_GLOBALS": {
49
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
50
"METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe",
51
"METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
52
"METHOD": "VM_TOOLS_UPLOAD",
53
"PAYLOAD_DIRECTORY": "C:\\payload_test",
54
"PYTHON": "C:\\software\\x86\\python27\\python.exe",
55
"TESTING_SNAPSHOT": "TESTING_BASE",
56
"TYPE": "VIRTUAL"
57
}
58
}
59
60