Msfconsole中set payload命令最新改進
爲了方便用戶的輸入,Msfconsole改進了set payload命令的輸入。在執行set payload命令時,可使用三種前綴,分別是/payload、payload、和/。或者,不使用任何前綴,直接指定攻擊載荷路徑便可。其中,能夠執行的四種方式以下所示:
(1)msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload /payload/windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
(2)msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload payload/windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
(3)msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload /windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
(4)msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcpwindows