Files
metasploit-gs/test/functional/framework/msftest/100_continue.msftest
T
Jonathan Cran 9a96aed4e7 psexec test, rename http 100_continue test
git-svn-id: file:///home/svn/framework3/trunk@11675 4d416f70-5f16-0410-b530-b9f4589650da
2011-01-30 01:39:25 +00:00

32 lines
684 B
Plaintext

<xml>
<msf_test>
<name>
example
</name>
<description>
This test will fail on upload, and should alert the user.
</description>
<commands>
use windows/iis/iis_webdav_upload_asp
set RHOST 127.0.0.1
set RPORT 54321
exploit
<ruby>
puts "werd!" ## prints to stdout :(
</ruby>
exit
exit
</commands>
<output>
<successes>
<success>Uploading</success>
<success>Exploit exception: The connection was refused by the remote host</success>
</successes>
<failures>
</failures>
<failure_exceptions>
<failure_exception>Exploit exception: The connection was refused by the remote host</failure_exception>
</failure_exceptions>
</output>
<msf_test>