msfpayload windows/shell/reverse_tcp
#11
klo autopawn -pter itu kan otomatis exploit berdasarkan port yang terbuka bro,
Quote:msf > db_autopwn
[*] Usage: db_autopwn [options]
-t Show all matching exploit modules
-x Select modules based on vulnerability references
-p Select modules based on open ports
-e Launch exploits against all matched targets
-r Use a reverse connect shell
-b Use a bind shell on a random port
-h Display this help text

lha klo manual bro lakukan cm yg ms08_67_netapi aja (ini kan cm port 445), klo session-nya yg jumlahnya 2 tadi pake exploit yg mana?


Messages In This Thread
RE: msfpayload windows/shell/reverse_tcp - by iKONspirasi - 09-15-2011, 01:56 AM




Users browsing this thread: 1 Guest(s)