CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/test/modules/exploits/windows/smb/psexec.json
Views: 11788
1
{
2
"COMMAND_LIST": [
3
"sessions -C sessions -l",
4
"sessions -C sysinfo",
5
"sessions -C exit"
6
],
7
"CREDS_FILE": "../JSON/creds.json",
8
"FRAMEWORK_BRANCH": "upstream/master",
9
"HTTP_PORT": 5309,
10
"MODULES": [
11
{
12
"NAME": "exploit/windows/smb/psexec",
13
"SETTINGS": [
14
"SMBUser=vagrant",
15
"SMBPass=vagrant",
16
"TARGET=0"
17
]
18
}
19
],
20
"MSF_HOSTS": [
21
{
22
"CPE": "cpe:/a:rapid7:metasploit:::",
23
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
24
"METHOD": "VM_TOOLS_UPLOAD",
25
"MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",
26
"MSF_PATH": "/home/msfuser/rapid7/metasploit-framework",
27
"TYPE": "VIRTUAL"
28
}
29
],
30
"PAYLOADS": [
31
{
32
"NAME": "windows/x64/meterpreter/reverse_tcp",
33
"SETTINGS": []
34
}
35
],
36
"STARTING_LISTENER": 30000,
37
"SUCCESS_LIST": [
38
"Session 1 created in the background"
39
],
40
"TARGETS": [
41
{
42
"CPE": "cpe:/o:microsoft:windows_7:::x64"
43
},
44
{
45
"CPE": "cpe:/o:microsoft:windows_10:::x64"
46
},
47
{
48
"CPE": "cpe:/o:microsoft:windows_8.1::sp1:x64"
49
},
50
{
51
"CPE": "cpe:/o:microsoft:windows_server_2008:r2:sp1:x64"
52
},
53
{
54
"CPE": "cpe:/o:microsoft:windows_7::sp1:x64",
55
"TESTING_SNAPSHOT": "DisableSMBv1"
56
},
57
{
58
"CPE": "cpe:/o:microsoft:windows_10:1607::x64",
59
"TESTING_SNAPSHOT": "DisableSMBv1"
60
},
61
{
62
"CPE": "cpe:/o:microsoft:windows_8.1:::x64",
63
"TESTING_SNAPSHOT": "DisableSMBv1"
64
},
65
{
66
"CPE": "cpe:/o:microsoft:windows_server_2008::r2:x64",
67
"TESTING_SNAPSHOT": "DisableSMBv1"
68
}
69
],
70
"TARGET_GLOBALS": {
71
"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",
72
"METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe",
73
"METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",
74
"METHOD": "EXPLOIT",
75
"PAYLOAD_DIRECTORY": "C:\\payload_test",
76
"PYTHON": "C:\\software\\x86\\python27\\python.exe",
77
"TYPE": "VIRTUAL"
78
}
79
}
80
81