▲_o丨开丶始︽ 发表于 2025-1-14 12:18:39

metasploit中msf的使用问题

为什么我用exploitms08-067payloadbind_tcp时msfexploit(ms08_067_netapi)>exploit•Startedbindhandler•Automaticallydetectingthetarget…•Fingerprint:Windows20...为什么我用 exploit ms08-067
payload bind_tcp时

msf exploit(ms08_067_netapi) > exploit
• Started bind handler
• Automatically detecting the target…
• Fingerprint: Windows 2000 – Service Pack 0 – 4 – lang:English
• Selected Target: Windows 2000 Universal
• Attempting to trigger the vulnerability…(应该获得shell的啊)
msf exploit(ms08_067_netapi) > exploit(可是就是不行呢)
求大神指点~~~!!!

freejaja 发表于 2025-1-14 12:24:00

<div class="answer-part__online start js-copy-content" data-s=e69b677ae85477bed4045c49d5ad8b18 data-t=1736829370 data-fg="0">

冒泡机长 发表于 2025-1-14 13:33:52

ggggggggggggggggggggggggggggggggggggggggggggggggggggggggggg

冒泡机长 发表于 2025-1-14 13:34:43

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
页: [1]
查看完整版本: metasploit中msf的使用问题