1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-05 14:57:30 +01:00

Adding some comment docs to run_all_post.rc

Adding some explanitory text to mubix's run_all_post.rc example script.
This commit is contained in:
Tod Beardsley 2011-12-12 10:34:33 -06:00
parent b4f58ef8fd
commit e4d59f9e62

View File

@ -1,3 +1,25 @@
# This is a sample resource script demonstrating a technique of running
# a single post module against several active sessions at once. The post
# module should be the currently active module, with sessions from other
# modules already established via exploit -j or an equivalent.
# Usage example
# msf exploit(psexec) > use post/windows/gather/checkvm
# msf post(checkvm) > resource scripts/resource/run_all_post.rc
# [*] Processing scripts/resource/run_all_post.rc for ERB directives.
# [*] resource (scripts/resource/run_all_post.rc)> Ruby Code (189 bytes)
# SESSION => 1
# [*] Running post/windows/gather/checkvm against session 1
# [*] Checking if WIN2K3TARGET is a Virtual Machine .....
# [*] This is a VMware Virtual Machine
# [*] Post module execution completed
# SESSION => 2
# [*] Running post/windows/gather/checkvm against session 2
# [*] Checking if WIN2K8TARGET is a Virtual Machine .....
# [*] This is a VMware Virtual Machine
# [*] Post module execution completed
# msf post(checkvm) >
<ruby>
framework.sessions.each_key do |session|
run_single("set SESSION #{session}")