Metasploit mailing list archives
msfcli exploit payload O - no payload options?
From: grutz at jingojango.net (Kurt Grutzmacher)
Date: Wed, 4 Apr 2007 11:46:50 -0500
Framework3: grutz:trunk $ ./msfcli exploit/windows/smb/ms06_066_nwwks PAYLOAD=windows/shell_bind_tcp O Name Current Setting Required Description ---- --------------- -------- ----------- RHOST yes The target address RPORT 445 yes Set the SMB service port SMBPIPE nwwks yes The pipe name to use (browser, srvsvc, wkssvc, ntsvcs) grutz:trunk $ Where are the payload options? -- ..:[ grutz at jingojango dot net ]:.. GPG fingerprint: 5FD6 A27D 63DB 3319 140F B3FB EC95 2A03 8CB3 ECB4 "There's just no amusing way to say, 'I have a CISSP'."
Current thread:
- msfcli exploit payload O - no payload options? Kurt Grutzmacher (Apr 04)
- msfcli exploit payload O - no payload options? H D Moore (Apr 04)
- msfcli exploit payload O - no payload options? Kurt Grutzmacher (Apr 04)
- msfcli exploit payload O - no payload options? H D Moore (Apr 04)