praetorian-inc / purple-team-attack-automation

Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs
Other
716 stars 118 forks source link

error to search purple: just bring me some TTP's #53

Open H3rn4n5 opened 4 years ago

H3rn4n5 commented 4 years ago

Steps to reproduce

I installed on Kali linux 2020 2a Downloaded from https://github.com/praetorian-code/purple-team-attack-automation then I followed the instructions. I open msfconsole with ./docker/bin/msfconsole and then search "purple" and the get a few items, i attach the followings errors occurs when execute the commands

root@kali:/home/purple-team-attack-automation# ./docker/bin/msfconsole Starting purple-team-attack-automation_db_1 ... done [-] *Rting the Metasploit Framework console...\ [-] WARNING: No database support: No database YAML file [-] [-] WARNING! The following modules could not be loaded! [-] /usr/src/metasploit-framework/modules/post/multi/purple/t1193.rb [-] Please see /root/.msf4/logs/framework.log for details.

                                                       https://metasploit.com

   =[ metasploit v5.0.69-dev-5e07f93720               ]

[] Processing docker/msfconsole.rc for ERB directives. [] resource (docker/msfconsole.rc)> Ruby Code (261 bytes) LHOST => 0.0.0.0 [-] Error while running command db_connect: Failed to connect to the Postgres data service: could not translate host name "db" to address: Name does not resolve

Call stack: /usr/src/metasploit-framework/lib/msf/ui/console/command_dispatcher/db.rb:2048:in db_connect_postgresql' /usr/src/metasploit-framework/lib/msf/ui/console/command_dispatcher/db.rb:1832:incmd_db_connect' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:523:in run_command' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:474:inblock in run_single' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:in each' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:inrun_single' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:56:in load_resource' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:ineval' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:in load_resource' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:183:inblock in initialize' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:in each' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:ininitialize' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in new' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:indriver' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in start' /usr/src/metasploit-framework/lib/metasploit/framework/command/base.rb:82:instart' ./msfconsole:49:in `

' [*] Reloading modules from all module paths... [-] Error while running command reload_all: No classes in Msf::Module::Platform::Linux for ,osx!

Call stack: /usr/src/metasploit-framework/lib/msf/core/module/platform.rb:61:in find_platform' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:55:inblock in initialize' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:53:in each' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:53:ininitialize' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:40:in new' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:40:infrom_a' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:30:in transform' /usr/src/metasploit-framework/lib/msf/core/module.rb:119:ininitialize' /usr/src/metasploit-framework/lib/msf/core/module/has_actions.rb:6:in initialize' /usr/src/metasploit-framework/lib/msf/core/post_mixin.rb:16:ininitialize' /usr/src/metasploit-framework/modules/post/multi/purple/t1153.rb:9:in initialize' /usr/src/metasploit-framework/lib/msf/core/module_set.rb:54:innew' /usr/src/metasploit-framework/lib/msf/core/module_set.rb:54:in create' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:61:inblock (3 levels) in refresh_metadata' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:57:in each' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:57:inblock (2 levels) in refresh_metadata' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:54:in each' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:54:inblock in refresh_metadata' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:51:in synchronize' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:51:inrefresh_metadata' /usr/src/metasploit-framework/lib/msf/core/module_manager/cache.rb:124:in refresh_cache_from_module_files' /usr/src/metasploit-framework/lib/msf/core/module_manager/reloading.rb:51:inreload_modules' /usr/src/metasploit-framework/lib/msf/ui/console/command_dispatcher/modules.rb:859:in cmd_reload_all' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:523:inrun_command' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:474:in block in run_single' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:ineach' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:in run_single' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:57:inload_resource' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:in eval' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:inload_resource' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:183:in block in initialize' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:ineach' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:in initialize' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:innew' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in driver' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:48:instart' /usr/src/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in start' ./msfconsole:49:in

'

msf5 > search purple

Matching Modules

Name Disclosure Date Rank Check Description


0 auxiliary/admin/smb/smb_connect normal No SMB Connection Utility 1 post/linux/purple/t1016 normal No System Network Configuration Discovery (T1016) Linux - Purple Team 2 post/linux/purple/t1033 normal No System Owner/User Discovery (T1033) Linux - Purple Team 3 post/linux/purple/t1049 normal No System Network Connection Discovery (T1049) Linux - Purple Team 4 post/linux/purple/t1057 normal No Process Discovery (T1057) Linux - Purple Team 5 post/linux/purple/t1069 normal No Permissions Groups Discovery (T1069) Linux - Purple Team 6 post/linux/purple/t1082 normal No System Information Discovery (T1082) Linux - Purple Team 7 post/linux/purple/t1087 normal No Account Discovery (T1087) Linux - Purple Team 8 post/linux/purple/t1107 normal No File Deletion (T1107) Linux - Purple Team 9 post/linux/purple/t1146 normal No Clear Command History (T1146) Linux - Purple Team 10 post/linux/purple/t1201 normal No Password Policy Discovery (T1201) Linux - Purple Team 11 post/multi/purple/t1018 normal No Remote System Discovery (T1018) Linux macOS - Purple Team 12 post/multi/purple/t1046 normal No Network Service Scanning (T1046) All - Purple Team

msf5 >