Metasploit mailing list archives

msfcli exploit payload O - no payload options?


From: grutz at jingojango.net (Kurt Grutzmacher)
Date: Wed, 4 Apr 2007 11:46:50 -0500

Framework3:

grutz:trunk $ ./msfcli exploit/windows/smb/ms06_066_nwwks PAYLOAD=windows/shell_bind_tcp O

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   RHOST                     yes       The target address
   RPORT    445              yes       Set the SMB service port
   SMBPIPE  nwwks            yes       The pipe name to use (browser, srvsvc, wkssvc, ntsvcs)

grutz:trunk $

Where are the payload options?

-- 
                 ..:[ grutz at jingojango dot net ]:..
     GPG fingerprint: 5FD6 A27D 63DB 3319 140F  B3FB EC95 2A03 8CB3 ECB4
        "There's just no amusing way to say, 'I have a CISSP'."



Current thread: