Path: blob/master/test/modules/auxiliary/scanner/smb/smb_login.json
28055 views
{1"TEST_NAME": "smb_login test",2"REPORT_PREFIX": "SmbLoginTest",3"FRAMEWORK_BRANCH": "upstream/master",4"HTTP_PORT": 5309,5"STARTING_LISTENER": 30000,6"CREDS_FILE": "../JSON/creds.json",7"MSF_HOSTS":8[9{10"TYPE": "VIRTUAL",11"METHOD": "VM_TOOLS_UPLOAD",12"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",13"CPE": "cpe:/a:rapid7:metasploit:::",14"MSF_ARTIFACT_PATH": "/home/msfuser/rapid7/test_artifacts",15"MSF_PATH": "/home/msfuser/rapid7/metasploit-framework"16}17],1819"TARGETS":20[21{22"TYPE": "VIRTUAL",23"METHOD": "EXPLOIT",24"CPE": "cpe:/o:microsoft:windows_server_2008:r2:sp1:x64",25"MODULES":26[27{28"NAME": "auxiliary/scanner/smb/smb_login",29"SETTINGS": [30"smbuser=vagrant",31"smbpass=vagrant"32]33}34]35},36{37"TYPE": "VIRTUAL",38"METHOD": "EXPLOIT",39"CPE": "cpe:/o:microsoft:windows_server_2016:::x64",40"MODULES":41[42{43"NAME": "auxiliary/scanner/smb/smb_login",44"SETTINGS": [45"smbuser=vagrant",46"smbpass=vagrant"47]48}49]50}51],52"TARGET_GLOBALS":53{54"TYPE": "VIRTUAL",55"HYPERVISOR_CONFIG": "../JSON/esxi_config.json",56"METHOD": "VM_TOOLS_UPLOAD",57"PAYLOAD_DIRECTORY": "C:\\payload_test",58"TESTING_SNAPSHOT": "TESTING_BASE",59"PYTHON": "C:\\software\\x86\\python27\\python.exe",60"METERPRETER_PYTHON": "C:\\software\\x86\\python27\\python.exe",61"METERPRETER_JAVA": "C:\\software\\x86\\java\\bin\\java.exe"62},63"COMMAND_LIST": [],64"SUCCESS_LIST": [65"- Success:"66]67}686970