praetorian-inc / purple-team-attack-automation

Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

error to search purple: just bring me some TTP's

H3rn4n5 opened this issue · comments

Steps to reproduce

I installed on Kali linux 2020 2a
Downloaded from https://github.com/praetorian-code/purple-team-attack-automation then
I followed the instructions.
I open msfconsole with ./docker/bin/msfconsole and then search "purple" and the get a few items, i attach the followings errors occurs when execute the commands

root@kali:/home/purple-team-attack-automation# ./docker/bin/msfconsole
Starting purple-team-attack-automation_db_1 ... done
[-] ***Rting the Metasploit Framework console...
[-] * WARNING: No database support: No database YAML file
[-] ***
[-] WARNING! The following modules could not be loaded!
[-] /usr/src/metasploit-framework/modules/post/multi/purple/t1193.rb
[-] Please see /root/.msf4/logs/framework.log for details.

                                                       https://metasploit.com


   =[ metasploit v5.0.69-dev-5e07f93720               ]
  • -- --=[ 1957 exploits - 1093 auxiliary - 442 post ]
  • -- --=[ 558 payloads - 45 encoders - 10 nops ]
  • -- --=[ 7 evasion ]

[] Processing docker/msfconsole.rc for ERB directives.
[
] resource (docker/msfconsole.rc)> Ruby Code (261 bytes)
LHOST => 0.0.0.0
[-] Error while running command db_connect: Failed to connect to the Postgres data service: could not translate host name "db" to address: Name does not resolve

Call stack:
/usr/src/metasploit-framework/lib/msf/ui/console/command_dispatcher/db.rb:2048:in db_connect_postgresql' /usr/src/metasploit-framework/lib/msf/ui/console/command_dispatcher/db.rb:1832:in cmd_db_connect'
/usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:523:in run_command' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:474:in block in run_single'
/usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:in each' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:in run_single'
/usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:56:in load_resource' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:in eval'
/usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:in load_resource' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:183:in block in initialize'
/usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:in each' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:in initialize'
/usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in new' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in driver'
/usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in start' /usr/src/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in start'
./msfconsole:49:in `

'
[*] Reloading modules from all module paths...
[-] Error while running command reload_all: No classes in Msf::Module::Platform::Linux for ,osx!

Call stack:
/usr/src/metasploit-framework/lib/msf/core/module/platform.rb:61:in find_platform' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:55:in block in initialize'
/usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:53:in each' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:53:in initialize'
/usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:40:in new' /usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:40:in from_a'
/usr/src/metasploit-framework/lib/msf/core/module/platform_list.rb:30:in transform' /usr/src/metasploit-framework/lib/msf/core/module.rb:119:in initialize'
/usr/src/metasploit-framework/lib/msf/core/module/has_actions.rb:6:in initialize' /usr/src/metasploit-framework/lib/msf/core/post_mixin.rb:16:in initialize'
/usr/src/metasploit-framework/modules/post/multi/purple/t1153.rb:9:in initialize' /usr/src/metasploit-framework/lib/msf/core/module_set.rb:54:in new'
/usr/src/metasploit-framework/lib/msf/core/module_set.rb:54:in create' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:61:in block (3 levels) in refresh_metadata'
/usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:57:in each' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:57:in block (2 levels) in refresh_metadata'
/usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:54:in each' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:54:in block in refresh_metadata'
/usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:51:in synchronize' /usr/src/metasploit-framework/lib/msf/core/modules/metadata/cache.rb:51:in refresh_metadata'
/usr/src/metasploit-framework/lib/msf/core/module_manager/cache.rb:124:in refresh_cache_from_module_files' /usr/src/metasploit-framework/lib/msf/core/module_manager/reloading.rb:51:in reload_modules'
/usr/src/metasploit-framework/lib/msf/ui/console/command_dispatcher/modules.rb:859:in cmd_reload_all' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:523:in run_command'
/usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:474:in block in run_single' /usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:in each'
/usr/src/metasploit-framework/lib/rex/ui/text/dispatcher_shell.rb:468:in run_single' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:57:in load_resource'
/usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:in eval' /usr/src/metasploit-framework/lib/rex/ui/text/resource.rb:61:in load_resource'
/usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:183:in block in initialize' /usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:in each'
/usr/src/metasploit-framework/lib/msf/ui/console/driver.rb:182:in initialize' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in new'
/usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:62:in driver' /usr/src/metasploit-framework/lib/metasploit/framework/command/console.rb:48:in start'
/usr/src/metasploit-framework/lib/metasploit/framework/command/base.rb:82:in start' ./msfconsole:49:in

'

msf5 > search purple

Matching Modules

Name Disclosure Date Rank Check Description


0 auxiliary/admin/smb/smb_connect normal No SMB Connection Utility
1 post/linux/purple/t1016 normal No System Network Configuration Discovery (T1016) Linux - Purple Team
2 post/linux/purple/t1033 normal No System Owner/User Discovery (T1033) Linux - Purple Team
3 post/linux/purple/t1049 normal No System Network Connection Discovery (T1049) Linux - Purple Team
4 post/linux/purple/t1057 normal No Process Discovery (T1057) Linux - Purple Team
5 post/linux/purple/t1069 normal No Permissions Groups Discovery (T1069) Linux - Purple Team
6 post/linux/purple/t1082 normal No System Information Discovery (T1082) Linux - Purple Team
7 post/linux/purple/t1087 normal No Account Discovery (T1087) Linux - Purple Team
8 post/linux/purple/t1107 normal No File Deletion (T1107) Linux - Purple Team
9 post/linux/purple/t1146 normal No Clear Command History (T1146) Linux - Purple Team
10 post/linux/purple/t1201 normal No Password Policy Discovery (T1201) Linux - Purple Team
11 post/multi/purple/t1018 normal No Remote System Discovery (T1018) Linux macOS - Purple Team
12 post/multi/purple/t1046 normal No Network Service Scanning (T1046) All - Purple Team

msf5 >