2023年6月24日发(作者:)
Msfconsole中setpayload命令最新改进Msfconsole中set payload命令最新改进为了⽅便⽤户的输⼊,Msfconsole改进了set payload命令的输⼊。在执⾏set payload命令时,可以使⽤三种前缀,分别是/payload、payload、和/。或者,不使⽤任何前缀,直接指定攻击载荷路径即可。其中,可以执⾏的四种⽅式如下所⽰:(1)msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload /payload/windows/x64/meterpreter/reverse_tcppayload => windows/x64/meterpreter/reverse_tcp(2)msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload payload/windows/x64/meterpreter/reverse_tcppayload => windows/x64/meterpreter/reverse_tcp(3)msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload /windows/x64/meterpreter/reverse_tcppayload => windows/x64/meterpreter/reverse_tcp(4)msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcppayload => windows/x64/meterpreter/reverse_tcp
发布者:admin,转转请注明出处:http://www.yc00.com/xiaochengxu/1687580011a21834.html
评论列表(0条)