#!/bin/bash for host in `cat file4` do echo pwning host $host; msfcli "auxiliary/scanner/scada/modbusdetect" RHOST $host E; done
A quasi-random collection of security-related bits'n'pieces that I have been using. I post stuff which I needed to do a bit of work to understand rather than just grabbing something from the first page of Google search results. I hope it's useful to someone like the army of blogs out there have been useful to me over time! Follow me on Twitter: https://twitter.com/Phreaklets
Saturday, June 8, 2013
Scripting metasploit with msfcli
I found the tutorials on the web to not work out of the box as msfcli is very picky about the format of the arguments, this is the snippet I used to do some testing, a super-simple Bash script (instead of the `cat file4` you can put whatever funky ls magic you need to do to locate your file):
Subscribe to:
Post Comments (Atom)
Bulk Fresh Fullz/Pros/Leads Available
ReplyDeleteHigh Credit Scores Fullz 700+
CC Fullz (USA/UK/CANADA)
SSN DOB DL Fullz
Office365 Leads
Dumps With Pin
Business EIN Fullz
Leads for Tax Return/PUA USA
ICQ/TG - @killhacks
WA - +92 317 2721122
Email- exploit dot tools4u at gmail dot com
All Spamming & Hacking Tools
Carding Methods/Loan Methods
Mailers/Senders/Shells/Brutes
C-panels/RDP's/SMTP's
Onion Web Links
I.p's/Proxies/Server I.P's
Combos/Premium account Logs
Fr**d B**le 201/2022/2023 Updated
ICQ- 752822040
Telegram - @killhacks