1. Pick which exploit to use
2. Configure the exploit with remote IP adress & port number
3. Pick the payload
4. Configure the payload with local IP address & port number
5. Check / Execute the exploit
Step | Command | Description |
1 | Show exploits | List all exploits |
2 | Use [exploit name] | Choose |
3 | Show payloads | To check all available payloads |
4 | Set PAYLOAD [payload name] | Set the payload |
5 | Show options | To check more option that can be set |
6 | Check | To check whether the host is exploitable or not |
7 | Exploit | Exploit the host |
No comments:
Post a Comment