Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add tab completion and MS17-010 support to analyze command #11878

Merged
merged 3 commits into from May 23, 2019

Conversation

Projects
None yet
3 participants
@wvu-r7
Copy link
Contributor

commented May 23, 2019

This is a continuation of #11877 without the msf5 label.

msf5 > use smb_ms17

Matching Modules
================

   #  Name                                Disclosure Date  Rank    Check  Description
   -  ----                                ---------------  ----    -----  -----------
   0  auxiliary/scanner/smb/smb_ms17_010                   normal  Yes    MS17-010 SMB RCE Detection


[*] Using auxiliary/scanner/smb/smb_ms17_010
msf5 auxiliary(scanner/smb/smb_ms17_010) > set rhosts 192.168.56.103,104
rhosts => 192.168.56.103,104
msf5 auxiliary(scanner/smb/smb_ms17_010) > run

[*] 192.168.56.103:445    - Connected to \\192.168.56.103\IPC$ with TID = 4096
[*] 192.168.56.103:445    - Received STATUS_INSUFF_SERVER_RESOURCES with FID = 0
[+] 192.168.56.103:445    - Host is likely VULNERABLE to MS17-010! - Windows Server 2008 R2 Standard 7601 Service Pack 1 x64 (64-bit)
[*] 192.168.56.103,104:445 - Scanned 1 of 2 hosts (50% complete)
[*] 192.168.56.104:445    - Connected to \\192.168.56.104\IPC$ with TID = 1
[*] 192.168.56.104:445    - Received STATUS_INVALID_HANDLE with FID = 0
[-] 192.168.56.104:445    - Host does NOT appear vulnerable.
[*] 192.168.56.103,104:445 - Scanned 2 of 2 hosts (100% complete)
[*] Auxiliary module execution completed
msf5 auxiliary(scanner/smb/smb_ms17_010) > analyze 192.168.56.103
[*] Analyzing 192.168.56.103...
[*] exploit/windows/smb/ms17_010_eternalblue
[*] exploit/windows/smb/ms17_010_eternalblue_win8
[*] exploit/windows/smb/ms17_010_psexec
msf5 auxiliary(scanner/smb/smb_ms17_010) >
@jmartin-r7
Copy link
Contributor

left a comment

Looks good I would rather use local scoped method than reach into the framework object.

Show resolved Hide resolved lib/msf/ui/console/command_dispatcher/db/analyze.rb Outdated

@jmartin-r7 jmartin-r7 merged commit 9df782c into rapid7:master May 23, 2019

1 of 3 checks passed

Metasploit Automation - Sanity Test Execution Running automation sanity tests. Details available on completion.
Details
continuous-integration/travis-ci/pr The Travis CI build is in progress
Details
Metasploit Automation - Test Execution Successfully completed all tests.
Details

jmartin-r7 added a commit that referenced this pull request May 23, 2019

msjenkins-r7 added a commit that referenced this pull request May 23, 2019

@jmartin-r7

This comment has been minimized.

Copy link
Contributor

commented May 23, 2019

Release Notes

This adds tab completion support to the analyze command.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.