Update multi_meterpreter_inject.rb
parent
cab19dc63c
commit
93a6614ab3
|
@ -30,8 +30,8 @@ class MetasploitModule < Msf::Post
|
||||||
[
|
[
|
||||||
OptString.new('PAYLOAD', [false, 'Payload to inject in to process memory', "windows/meterpreter/reverse_tcp"]),
|
OptString.new('PAYLOAD', [false, 'Payload to inject in to process memory', "windows/meterpreter/reverse_tcp"]),
|
||||||
OptInt.new('LPORT', [false, 'Port number for the payload LPORT variable.', 4444]),
|
OptInt.new('LPORT', [false, 'Port number for the payload LPORT variable.', 4444]),
|
||||||
OptString.new('IPLIST', [true, 'List of semicolom separated IP list.', Rex::Socket.source_address("1.2.3.4")]),
|
OptString.new('IPLIST', [true, 'List of semicolon separated IP list.', Rex::Socket.source_address("1.2.3.4")]),
|
||||||
OptString.new('PIDLIST', [false, 'List of semicolom separated PID list.', '']),
|
OptString.new('PIDLIST', [false, 'List of semicolon separated PID list.', '']),
|
||||||
OptBool.new('HANDLER', [false, 'Start new exploit/multi/handler job on local box.', false]),
|
OptBool.new('HANDLER', [false, 'Start new exploit/multi/handler job on local box.', false]),
|
||||||
OptInt.new('AMOUNT', [false, 'Select the amount of shells you want to spawn.', 1])
|
OptInt.new('AMOUNT', [false, 'Select the amount of shells you want to spawn.', 1])
|
||||||
], self.class)
|
], self.class)
|
||||||
|
|
Loading…
Reference in New Issue