Saturday, June 8, 2013

Scripting metasploit with msfcli

I found the tutorials on the web to not work out of the box as msfcli is very picky about the format of the arguments, this is the snippet I used to do some testing, a super-simple Bash script (instead of the `cat file4` you can put whatever funky ls magic you need to do to locate your file):
#!/bin/bash
for host in `cat file4`
do
        echo pwning host $host;
        msfcli "auxiliary/scanner/scada/modbusdetect" RHOST $host E;
done

1 comment:

  1. Bulk Fresh Fullz/Pros/Leads Available

    High Credit Scores Fullz 700+
    CC Fullz (USA/UK/CANADA)
    SSN DOB DL Fullz
    Office365 Leads
    Dumps With Pin
    Business EIN Fullz
    Leads for Tax Return/PUA USA

    ICQ/TG - @killhacks
    WA - +92 317 2721122
    Email- exploit dot tools4u at gmail dot com

    All Spamming & Hacking Tools
    Carding Methods/Loan Methods
    Mailers/Senders/Shells/Brutes
    C-panels/RDP's/SMTP's
    Onion Web Links
    I.p's/Proxies/Server I.P's
    Combos/Premium account Logs
    Fr**d B**le 201/2022/2023 Updated

    ICQ- 752822040
    Telegram - @killhacks

    ReplyDelete