metasploit中msf的使用问题
为什么我用exploitms08-067payloadbind_tcp时msfexploit(ms08_067_netapi)>exploit•Startedbindhandler•Automaticallydetectingthetarget…•Fingerprint:Windows20...为什么我用 exploit ms08-067payload bind_tcp时
msf exploit(ms08_067_netapi) > exploit
• Started bind handler
• Automatically detecting the target…
• Fingerprint: Windows 2000 – Service Pack 0 – 4 – lang:English
• Selected Target: Windows 2000 Universal
• Attempting to trigger the vulnerability…(应该获得shell的啊)
msf exploit(ms08_067_netapi) > exploit(可是就是不行呢)
求大神指点~~~!!! <div class="answer-part__online start js-copy-content" data-s=e69b677ae85477bed4045c49d5ad8b18 data-t=1736829370 data-fg="0"> ggggggggggggggggggggggggggggggggggggggggggggggggggggggggggg aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
页:
[1]