1. Pick which exploit to use
2. Configure the exploit with remote IP adress & port number
3. Pick the payload
4. Configure the payload with local IP address & port number
5. Check / Execute the exploit
| Step | Command | Description |
| 1 | Show exploits | List all exploits |
| 2 | Use [exploit name] | Choose |
| 3 | Show payloads | To check all available payloads |
| 4 | Set PAYLOAD [payload name] | Set the payload |
| 5 | Show options | To check more option that can be set |
| 6 | Check | To check whether the host is exploitable or not |
| 7 | Exploit | Exploit the host |
No comments:
Post a Comment