/spec/lib/rex/exploitation/cmdstager/vbs_spec.rb

https://github.com/debbiemezyene/metasploit-framework · Ruby · 35 lines · 25 code · 9 blank · 1 comment · 0 complexity · ecc1680fd227c94d01156425d6931654 MD5 · raw file

  1. # -*- coding:binary -*-
  2. require 'spec_helper'
  3. require 'rex/exploitation/cmdstager'
  4. describe Rex::Exploitation::CmdStagerVBS do
  5. let(:exe) { "MZ" }
  6. subject(:cmd_stager) do
  7. described_class.new(exe)
  8. end
  9. describe '#cmd_concat_operator' do
  10. it "returns &" do
  11. expect(cmd_stager.cmd_concat_operator).to eq(" & ")
  12. end
  13. end
  14. describe '#generate' do
  15. let(:opts) do
  16. {
  17. :decoder => File.join(Msf::Config.data_directory, "exploits", "cmdstager", "vbs_b64")
  18. }
  19. end
  20. it "returns an array of commands" do
  21. result = cmd_stager.generate(opts)
  22. expect(result).to be_kind_of(Array)
  23. expect(result).to_not be_empty
  24. end
  25. end
  26. end