Exemple #1
0
 def msfCheck(self):
     """Test to see if we can connect to the Metasploit msgrpc interface"""
     msf = myMsf(host=self.config['msfhost'],
                 port=self.config['msfport'],
                 user=self.config['msfuser'],
                 password=self.config['msfpass'])
     if not msf.isAuthenticated():
         self.display.error(
             "Could not connect to Metasploit msgrpc service with the following parameters:"
         )
         self.display.error("     host     = [%s]" %
                            (self.config['msfhost']))
         self.display.error("     port     = [%s]" %
                            (self.config['msfport']))
         self.display.error("     user     = [%s]" %
                            (self.config['msfuser']))
         self.display.error("     password = [%s]" %
                            (self.config['msfpass']))
         self.display.alert(
             "If you wish to make use of Metasploit modules within APT2, please update the config file with the "
             "appropiate settings.")
         self.display.error(
             "Connect by launching msfconsole and then issue the following command:"
         )
         self.display.error("     load msgrpc User="******"Pass="******" ServerPort=" +
                            self.config['msfport'])
         self.display.output()
Exemple #2
0
    def displayBanner(self):
        self.display.output()
        self.display.output("      dM.    `MMMMMMMb. MMMMMMMMMM      ")
        self.display.output("     ,MMb     MM    `Mb /   MM   \      ")
        self.display.output("     d'YM.    MM     MM     MM   ____   ")
        self.display.output("    ,P `Mb    MM     MM     MM  6MMMMb  ")
        self.display.output("    d'  YM.   MM    .M9     MM MM'  `Mb ")
        self.display.output("   ,P   `Mb   MMMMMMM9'     MM      ,MM ")
        self.display.output("   d'    YM.  MM            MM     ,MM' ")
        self.display.output("  ,MMMMMMMMb  MM            MM   ,M'    ")
        self.display.output("  d'      YM. MM            MM ,M'      ")
        self.display.output("_dM_     _dMM_MM_          _MM_MMMMMMMM ")
        self.display.output()

        self.display.output()
        self.display.output("An Automated Penetration Testing Toolkit")
        self.display.output("Written by: Adam Compton & Austin Lane")
        self.display.output("Verion: %s" % self.version)
        self.display.output()
        self.display.output("%i : Input Modules Loaded" %
                            len(self.inputModules))
        self.display.output("%i : Action Modules Loaded" %
                            len(self.actionModules))
        self.display.output()
        self.display.alert("The KnowledgeBase will be auto saved to : %s" %
                           self.kbSaveFile)
        self.display.output()
        self.display.alert("Local IP is set to : %s" % self.config['lhost'])
        self.display.alert(
            "      If you would rather use a different IP, then specify it via the [--ip <ip>] argument."
        )

        # test to see if we can connect to msfrpc
        msf = myMsf(host=self.config['msfhost'],
                    port=self.config['msfport'],
                    user=self.config['msfuser'],
                    password=self.config['msfpass'])
        if (not msf.isAuthenticated()):
            self.display.output()
            self.display.error(
                "Could not connect to Metasploit msgrpc service with the following parameters:"
            )
            self.display.error("     host     = [%s]" %
                               (self.config['msfhost']))
            self.display.error("     port     = [%s]" %
                               (self.config['msfport']))
            self.display.error("     user     = [%s]" %
                               (self.config['msfuser']))
            self.display.error("     password = [%s]" %
                               (self.config['msfpass']))
            self.display.alert(
                "If you wish to make use of metasploit modules within APT2, please update the config file with the "
                "appropiate settings.")

        self.display.output()
Exemple #3
0
 def msfCheck(self):
     """Test to see if we can connect to the Metasploit msgrpc interface"""
     msf = myMsf(host=self.config['msfhost'], port=self.config['msfport'], user=self.config['msfuser'],
                 password=self.config['msfpass'])
     if not msf.isAuthenticated():
         self.display.error(
             "Could not connect to Metasploit msgrpc service with the following parameters:")
         self.display.error("     host     = [%s]" % (self.config['msfhost']))
         self.display.error("     port     = [%s]" % (self.config['msfport']))
         self.display.error("     user     = [%s]" % (self.config['msfuser']))
         self.display.error("     password = [%s]" % (self.config['msfpass']))
         self.display.alert(
             "If you wish to make use of Metasploit modules within APT2, please update the config file with the "
             "appropiate settings.")
Exemple #4
0
 def msfCheck(self):
     """Test to see if we can connect to the Metasploit msgrpc interface"""
     msf = myMsf(host=self.config['msfhost'], port=self.config['msfport'], user=self.config['msfuser'],
                 password=self.config['msfpass'])
     if not msf.isAuthenticated():
         self.display.error(
             "Could not connect to Metasploit msgrpc service with the following parameters:")
         self.display.error("     host     = [%s]" % (self.config['msfhost']))
         self.display.error("     port     = [%s]" % (self.config['msfport']))
         self.display.error("     user     = [%s]" % (self.config['msfuser']))
         self.display.error("     password = [%s]" % (self.config['msfpass']))
         self.display.alert(
             "If you wish to make use of Metasploit modules within APT2, please update the config file with the "
             "appropiate settings.")
         self.display.error("Connect by launching msfconsole and then issue the following commands:")
         self.display.error("     load msgrpc User="******" Pass="******" ServerPort=" + self.config['msfport'])
         self.display.error("     resource " + self.config["miscDir"] + "apt2.rc")
         self.display.output()
Exemple #5
0
    def displayBanner(self):
        self.display.output()
        self.display.output("      dM.    `MMMMMMMb. MMMMMMMMMM      ")
        self.display.output("     ,MMb     MM    `Mb /   MM   \      ")
        self.display.output("     d'YM.    MM     MM     MM   ____   ")
        self.display.output("    ,P `Mb    MM     MM     MM  6MMMMb  ")
        self.display.output("    d'  YM.   MM    .M9     MM MM'  `Mb ")
        self.display.output("   ,P   `Mb   MMMMMMM9'     MM      ,MM ")
        self.display.output("   d'    YM.  MM            MM     ,MM' ")
        self.display.output("  ,MMMMMMMMb  MM            MM   ,M'    ")
        self.display.output("  d'      YM. MM            MM ,M'      ")
        self.display.output("_dM_     _dMM_MM_          _MM_MMMMMMMM ")
        self.display.output()

        self.display.output()
        self.display.output("An Automated Penetration Testing Toolkit")
        self.display.output("Written by: Adam Compton & Austin Lane")
        self.display.output("Verion: %s" % self.version)
        self.display.output()
        self.display.output("%i : Input Modules Loaded" % len(self.inputModules))
        self.display.output("%i : Action Modules Loaded" % len(self.actionModules))
        self.display.output()
        self.display.alert("The KnowledgeBase will be auto saved to : %s" % self.kbSaveFile)
        self.display.output()
        self.display.alert("Local IP is set to : %s" % self.config['lhost'])
        self.display.alert(
            "      If you would rather use a different IP, then specify it via the [--ip <ip>] argument.")

        # test to see if we can connect to msfrpc
        msf = myMsf(host=self.config['msfhost'], port=self.config['msfport'], user=self.config['msfuser'],
                    password=self.config['msfpass'])
        if (not msf.isAuthenticated()):
            self.display.output()
            self.display.error("Could not connect to Metasploit msgrpc service with the following parameters:")
            self.display.error("     host     = [%s]" % (self.config['msfhost']))
            self.display.error("     port     = [%s]" % (self.config['msfport']))
            self.display.error("     user     = [%s]" % (self.config['msfuser']))
            self.display.error("     password = [%s]" % (self.config['msfpass']))
            self.display.alert(
                "If you wish to make use of metasploit modules within APT2, please update the config file with the "
                "appropiate settings.")

        self.display.output()