Msfconsole中set payload命令最新改进
为了方便用户的输入,Msfconsole改进了set payload命令的输入。在执行set payload命令时,可以使用三种前缀,分别是/payload、payload、和/。或者,不使用任何前缀,直接指定攻击载荷路径即可。其中,可以执行的四种方式如下所示:
(1)msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload /payload/windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
(2)msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload payload/windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
(3)msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload /windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
(4)msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
来源:oschina
链接:https://my.oschina.net/u/1585857/blog/3175471