Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add tab completion and MS17-010 support to analyze command #11878

merged 3 commits into from May 23, 2019


None yet
3 participants
Copy link

commented May 23, 2019

This is a continuation of #11877 without the msf5 label.

msf5 > use smb_ms17

Matching Modules

   #  Name                                Disclosure Date  Rank    Check  Description
   -  ----                                ---------------  ----    -----  -----------
   0  auxiliary/scanner/smb/smb_ms17_010                   normal  Yes    MS17-010 SMB RCE Detection

[*] Using auxiliary/scanner/smb/smb_ms17_010
msf5 auxiliary(scanner/smb/smb_ms17_010) > set rhosts,104
rhosts =>,104
msf5 auxiliary(scanner/smb/smb_ms17_010) > run

[*]    - Connected to \\\IPC$ with TID = 4096
[+]    - Host is likely VULNERABLE to MS17-010! - Windows Server 2008 R2 Standard 7601 Service Pack 1 x64 (64-bit)
[*],104:445 - Scanned 1 of 2 hosts (50% complete)
[*]    - Connected to \\\IPC$ with TID = 1
[*]    - Received STATUS_INVALID_HANDLE with FID = 0
[-]    - Host does NOT appear vulnerable.
[*],104:445 - Scanned 2 of 2 hosts (100% complete)
[*] Auxiliary module execution completed
msf5 auxiliary(scanner/smb/smb_ms17_010) > analyze
[*] Analyzing
[*] exploit/windows/smb/ms17_010_eternalblue
[*] exploit/windows/smb/ms17_010_eternalblue_win8
[*] exploit/windows/smb/ms17_010_psexec
msf5 auxiliary(scanner/smb/smb_ms17_010) >
Copy link

left a comment

Looks good I would rather use local scoped method than reach into the framework object.

Show resolved Hide resolved lib/msf/ui/console/command_dispatcher/db/analyze.rb Outdated

@jmartin-r7 jmartin-r7 merged commit 9df782c into rapid7:master May 23, 2019

1 of 3 checks passed

Metasploit Automation - Sanity Test Execution Running automation sanity tests. Details available on completion.
continuous-integration/travis-ci/pr The Travis CI build is in progress
Metasploit Automation - Test Execution Successfully completed all tests.

jmartin-r7 added a commit that referenced this pull request May 23, 2019

msjenkins-r7 added a commit that referenced this pull request May 23, 2019


This comment has been minimized.

Copy link

commented May 23, 2019

Release Notes

This adds tab completion support to the analyze command.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.