I installed on Kali linux 2020 2a
Downloaded from https://github.com/praetorian-code/purple-team-attack-automation then
I followed the instructions.
I open msfconsole with ./docker/bin/msfconsole and then search "purple" and the get a few items, i attach the followings errors occurs when execute the commands
root@kali:/home/purple-team-attack-automation# ./docker/bin/msfconsole
Starting purple-team-attack-automation_db_1 ... done
[-] *Rting the Metasploit Framework console...\
[-] WARNING: No database support: No database YAML file
[-]
[-] WARNING! The following modules could not be loaded!
[-] /usr/src/metasploit-framework/modules/post/multi/purple/t1193.rb
[-] Please see /root/.msf4/logs/framework.log for details.
[] Processing docker/msfconsole.rc for ERB directives.
[] resource (docker/msfconsole.rc)> Ruby Code (261 bytes)
LHOST => 0.0.0.0
[-] Error while running command db_connect: Failed to connect to the Postgres data service: could not translate host name "db" to address: Name does not resolve
Call stack:
/usr/src/metasploit-framework/lib/msf/ui/console/command_dispatcher/db.rb:2048:in db_connect_postgresql' /usr/src/metasploit-framework/lib/msf/ui/console/command_dispatcher/db.rb:1832:incmd_db_connect'
/usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:523:in run_command' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:474:inblock in run_single'
/usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:in each' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:inrun_single'
/usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:56:in load_resource' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:ineval'
/usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:in load_resource' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:183:inblock in initialize'
/usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:in each' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:ininitialize'
/usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in new' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:indriver'
/usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in start' /usr/src/metasploit-framework/lib/metasploit/framework/command/base.rb:82:instart'
./msfconsole:49:in `'
[*] Reloading modules from all module paths...
[-] Error while running command reload_all: No classes in Msf::Module::Platform::Linux for ,osx!
0 auxiliary/admin/smb/smb_connect normal No SMB Connection Utility
1 post/linux/purple/t1016 normal No System Network Configuration Discovery (T1016) Linux - Purple Team
2 post/linux/purple/t1033 normal No System Owner/User Discovery (T1033) Linux - Purple Team
3 post/linux/purple/t1049 normal No System Network Connection Discovery (T1049) Linux - Purple Team
4 post/linux/purple/t1057 normal No Process Discovery (T1057) Linux - Purple Team
5 post/linux/purple/t1069 normal No Permissions Groups Discovery (T1069) Linux - Purple Team
6 post/linux/purple/t1082 normal No System Information Discovery (T1082) Linux - Purple Team
7 post/linux/purple/t1087 normal No Account Discovery (T1087) Linux - Purple Team
8 post/linux/purple/t1107 normal No File Deletion (T1107) Linux - Purple Team
9 post/linux/purple/t1146 normal No Clear Command History (T1146) Linux - Purple Team
10 post/linux/purple/t1201 normal No Password Policy Discovery (T1201) Linux - Purple Team
11 post/multi/purple/t1018 normal No Remote System Discovery (T1018) Linux macOS - Purple Team
12 post/multi/purple/t1046 normal No Network Service Scanning (T1046) All - Purple Team
Steps to reproduce
I installed on Kali linux 2020 2a Downloaded from https://github.com/praetorian-code/purple-team-attack-automation then I followed the instructions. I open msfconsole with ./docker/bin/msfconsole and then search "purple" and the get a few items, i attach the followings errors occurs when execute the commands
root@kali:/home/purple-team-attack-automation# ./docker/bin/msfconsole Starting purple-team-attack-automation_db_1 ... done [-] *Rting the Metasploit Framework console...\ [-] WARNING: No database support: No database YAML file [-] [-] WARNING! The following modules could not be loaded! [-] /usr/src/metasploit-framework/modules/post/multi/purple/t1193.rb [-] Please see /root/.msf4/logs/framework.log for details.
[] Processing docker/msfconsole.rc for ERB directives. [] resource (docker/msfconsole.rc)> Ruby Code (261 bytes) LHOST => 0.0.0.0 [-] Error while running command db_connect: Failed to connect to the Postgres data service: could not translate host name "db" to address: Name does not resolve
Call stack: /usr/src/metasploit-framework/lib/msf/ui/console/command_dispatcher/db.rb:2048:in'
[*] Reloading modules from all module paths...
[-] Error while running command reload_all: No classes in Msf::Module::Platform::Linux for ,osx!
db_connect_postgresql' /usr/src/metasploit-framework/lib/msf/ui/console/command_dispatcher/db.rb:1832:in
cmd_db_connect' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:523:inrun_command' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:474:in
block in run_single' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:ineach' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:in
run_single' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:56:inload_resource' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:in
eval' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:inload_resource' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:183:in
block in initialize' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:ineach' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:in
initialize' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:innew' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in
driver' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:48:instart' /usr/src/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in
start' ./msfconsole:49:in `Call stack: /usr/src/metasploit-framework/lib/msf/core/module/platform.rb:61:in'
find_platform' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:55:in
block in initialize' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:53:ineach' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:53:in
initialize' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:40:innew' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:40:in
from_a' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:30:intransform' /usr/src/metasploit-framework/lib/msf/core/module.rb:119:in
initialize' /usr/src/metasploit-framework/lib/msf/core/module/has_actions.rb:6:ininitialize' /usr/src/metasploit-framework/lib/msf/core/post_mixin.rb:16:in
initialize' /usr/src/metasploit-framework/modules/post/multi/purple/t1153.rb:9:ininitialize' /usr/src/metasploit-framework/lib/msf/core/module_set.rb:54:in
new' /usr/src/metasploit-framework/lib/msf/core/module_set.rb:54:increate' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:61:in
block (3 levels) in refresh_metadata' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:57:ineach' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:57:in
block (2 levels) in refresh_metadata' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:54:ineach' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:54:in
block in refresh_metadata' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:51:insynchronize' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:51:in
refresh_metadata' /usr/src/metasploit-framework/lib/msf/core/module_manager/cache.rb:124:inrefresh_cache_from_module_files' /usr/src/metasploit-framework/lib/msf/core/module_manager/reloading.rb:51:in
reload_modules' /usr/src/metasploit-framework/lib/msf/ui/console/command_dispatcher/modules.rb:859:incmd_reload_all' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:523:in
run_command' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:474:inblock in run_single' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:in
each' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:inrun_single' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:57:in
load_resource' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:ineval' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:in
load_resource' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:183:inblock in initialize' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:in
each' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:ininitialize' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in
new' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:indriver' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in
start' /usr/src/metasploit-framework/lib/metasploit/framework/command/base.rb:82:instart' ./msfconsole:49:in
msf5 > search purple
Matching Modules
Name Disclosure Date Rank Check Description
0 auxiliary/admin/smb/smb_connect normal No SMB Connection Utility 1 post/linux/purple/t1016 normal No System Network Configuration Discovery (T1016) Linux - Purple Team 2 post/linux/purple/t1033 normal No System Owner/User Discovery (T1033) Linux - Purple Team 3 post/linux/purple/t1049 normal No System Network Connection Discovery (T1049) Linux - Purple Team 4 post/linux/purple/t1057 normal No Process Discovery (T1057) Linux - Purple Team 5 post/linux/purple/t1069 normal No Permissions Groups Discovery (T1069) Linux - Purple Team 6 post/linux/purple/t1082 normal No System Information Discovery (T1082) Linux - Purple Team 7 post/linux/purple/t1087 normal No Account Discovery (T1087) Linux - Purple Team 8 post/linux/purple/t1107 normal No File Deletion (T1107) Linux - Purple Team 9 post/linux/purple/t1146 normal No Clear Command History (T1146) Linux - Purple Team 10 post/linux/purple/t1201 normal No Password Policy Discovery (T1201) Linux - Purple Team 11 post/multi/purple/t1018 normal No Remote System Discovery (T1018) Linux macOS - Purple Team 12 post/multi/purple/t1046 normal No Network Service Scanning (T1046) All - Purple Team
msf5 >