-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Agent Metasploit #4
Conversation
- Set WORKSPACE to Ostorlab
@@ -17,7 +17,9 @@ warn_incomplete_stub = True | |||
warn_redundant_casts = True | |||
#warn_unreachable = True | |||
warn_unused_ignores = True | |||
disallow_any_unimported = True | |||
disallow_any_unimported = False |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
it's raising errors because of pymetasploit3
local module
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How hard would it be to add typing there?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think it has much value right now given the 90+ pending exploits we have.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@BlueSquare1 you can ignore pymetasploit3
without ignoring everything.
…t_core # Conflicts: # tools/pymetasploit3/tests/test_db.py
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please use python3.11 :D
- Unit tests for prepare_target
As discussed, add support for running multiple modules. |
Please update the description. |
@@ -17,7 +17,9 @@ warn_incomplete_stub = True | |||
warn_redundant_casts = True | |||
#warn_unreachable = True | |||
warn_unused_ignores = True | |||
disallow_any_unimported = True | |||
disallow_any_unimported = False |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How hard would it be to add typing there?
ostorlab.yaml
Outdated
- key: agent//metasploit | ||
args: | ||
- name: module | ||
type: string | ||
value: 'auxiliary/scanner/portscan/tcp' | ||
- name: options | ||
type: array | ||
value: | ||
- name: "PORTS" | ||
value: "80, 443" | ||
``` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please correct.
The risk rating defaults to
High
because we're using metasploit with CISA exploits for now.