def msfCheck(self): """Test to see if we can connect to the Metasploit msgrpc interface""" msf = myMsf(host=self.config['msfhost'], port=self.config['msfport'], user=self.config['msfuser'], password=self.config['msfpass']) if not msf.isAuthenticated(): self.display.error( "Could not connect to Metasploit msgrpc service with the following parameters:" ) self.display.error(" host = [%s]" % (self.config['msfhost'])) self.display.error(" port = [%s]" % (self.config['msfport'])) self.display.error(" user = [%s]" % (self.config['msfuser'])) self.display.error(" password = [%s]" % (self.config['msfpass'])) self.display.alert( "If you wish to make use of Metasploit modules within APT2, please update the config file with the " "appropiate settings.") self.display.error( "Connect by launching msfconsole and then issue the following command:" ) self.display.error(" load msgrpc User="******"Pass="******" ServerPort=" + self.config['msfport']) self.display.output()
def displayBanner(self): self.display.output() self.display.output(" dM. `MMMMMMMb. MMMMMMMMMM ") self.display.output(" ,MMb MM `Mb / MM \ ") self.display.output(" d'YM. MM MM MM ____ ") self.display.output(" ,P `Mb MM MM MM 6MMMMb ") self.display.output(" d' YM. MM .M9 MM MM' `Mb ") self.display.output(" ,P `Mb MMMMMMM9' MM ,MM ") self.display.output(" d' YM. MM MM ,MM' ") self.display.output(" ,MMMMMMMMb MM MM ,M' ") self.display.output(" d' YM. MM MM ,M' ") self.display.output("_dM_ _dMM_MM_ _MM_MMMMMMMM ") self.display.output() self.display.output() self.display.output("An Automated Penetration Testing Toolkit") self.display.output("Written by: Adam Compton & Austin Lane") self.display.output("Verion: %s" % self.version) self.display.output() self.display.output("%i : Input Modules Loaded" % len(self.inputModules)) self.display.output("%i : Action Modules Loaded" % len(self.actionModules)) self.display.output() self.display.alert("The KnowledgeBase will be auto saved to : %s" % self.kbSaveFile) self.display.output() self.display.alert("Local IP is set to : %s" % self.config['lhost']) self.display.alert( " If you would rather use a different IP, then specify it via the [--ip <ip>] argument." ) # test to see if we can connect to msfrpc msf = myMsf(host=self.config['msfhost'], port=self.config['msfport'], user=self.config['msfuser'], password=self.config['msfpass']) if (not msf.isAuthenticated()): self.display.output() self.display.error( "Could not connect to Metasploit msgrpc service with the following parameters:" ) self.display.error(" host = [%s]" % (self.config['msfhost'])) self.display.error(" port = [%s]" % (self.config['msfport'])) self.display.error(" user = [%s]" % (self.config['msfuser'])) self.display.error(" password = [%s]" % (self.config['msfpass'])) self.display.alert( "If you wish to make use of metasploit modules within APT2, please update the config file with the " "appropiate settings.") self.display.output()
def msfCheck(self): """Test to see if we can connect to the Metasploit msgrpc interface""" msf = myMsf(host=self.config['msfhost'], port=self.config['msfport'], user=self.config['msfuser'], password=self.config['msfpass']) if not msf.isAuthenticated(): self.display.error( "Could not connect to Metasploit msgrpc service with the following parameters:") self.display.error(" host = [%s]" % (self.config['msfhost'])) self.display.error(" port = [%s]" % (self.config['msfport'])) self.display.error(" user = [%s]" % (self.config['msfuser'])) self.display.error(" password = [%s]" % (self.config['msfpass'])) self.display.alert( "If you wish to make use of Metasploit modules within APT2, please update the config file with the " "appropiate settings.")
def msfCheck(self): """Test to see if we can connect to the Metasploit msgrpc interface""" msf = myMsf(host=self.config['msfhost'], port=self.config['msfport'], user=self.config['msfuser'], password=self.config['msfpass']) if not msf.isAuthenticated(): self.display.error( "Could not connect to Metasploit msgrpc service with the following parameters:") self.display.error(" host = [%s]" % (self.config['msfhost'])) self.display.error(" port = [%s]" % (self.config['msfport'])) self.display.error(" user = [%s]" % (self.config['msfuser'])) self.display.error(" password = [%s]" % (self.config['msfpass'])) self.display.alert( "If you wish to make use of Metasploit modules within APT2, please update the config file with the " "appropiate settings.") self.display.error("Connect by launching msfconsole and then issue the following commands:") self.display.error(" load msgrpc User="******" Pass="******" ServerPort=" + self.config['msfport']) self.display.error(" resource " + self.config["miscDir"] + "apt2.rc") self.display.output()
def displayBanner(self): self.display.output() self.display.output(" dM. `MMMMMMMb. MMMMMMMMMM ") self.display.output(" ,MMb MM `Mb / MM \ ") self.display.output(" d'YM. MM MM MM ____ ") self.display.output(" ,P `Mb MM MM MM 6MMMMb ") self.display.output(" d' YM. MM .M9 MM MM' `Mb ") self.display.output(" ,P `Mb MMMMMMM9' MM ,MM ") self.display.output(" d' YM. MM MM ,MM' ") self.display.output(" ,MMMMMMMMb MM MM ,M' ") self.display.output(" d' YM. MM MM ,M' ") self.display.output("_dM_ _dMM_MM_ _MM_MMMMMMMM ") self.display.output() self.display.output() self.display.output("An Automated Penetration Testing Toolkit") self.display.output("Written by: Adam Compton & Austin Lane") self.display.output("Verion: %s" % self.version) self.display.output() self.display.output("%i : Input Modules Loaded" % len(self.inputModules)) self.display.output("%i : Action Modules Loaded" % len(self.actionModules)) self.display.output() self.display.alert("The KnowledgeBase will be auto saved to : %s" % self.kbSaveFile) self.display.output() self.display.alert("Local IP is set to : %s" % self.config['lhost']) self.display.alert( " If you would rather use a different IP, then specify it via the [--ip <ip>] argument.") # test to see if we can connect to msfrpc msf = myMsf(host=self.config['msfhost'], port=self.config['msfport'], user=self.config['msfuser'], password=self.config['msfpass']) if (not msf.isAuthenticated()): self.display.output() self.display.error("Could not connect to Metasploit msgrpc service with the following parameters:") self.display.error(" host = [%s]" % (self.config['msfhost'])) self.display.error(" port = [%s]" % (self.config['msfport'])) self.display.error(" user = [%s]" % (self.config['msfuser'])) self.display.error(" password = [%s]" % (self.config['msfpass'])) self.display.alert( "If you wish to make use of metasploit modules within APT2, please update the config file with the " "appropiate settings.") self.display.output()