MSF_HOST NAMEMSF_HOST IPMSF COMMIT VERSIONPCAP
Sanity_APT_MSF_HOST192.168.15.31cf7096f8ba899a93c254f9e83417865257681d1aPCAP FILE
TARGETTYPEMSF_HOSTMODULEPAYLOADSTATUSSESSION
Sanity_Win2016x64
192.168.16.182
VIRTUALSanity_APT_MSF_HOST
192.168.15.31
exploit/multi/handlerwindows/x64/meterpreter/bind_tcp
windows-x64-meterpreter-bind_tcp-192x168x16x182-30001.exe
PASSED SESSION CONTENT
Sanity_Win2016x64
192.168.16.182
VIRTUALSanity_APT_MSF_HOST
192.168.15.31
exploit/multi/handlerwindows/meterpreter/reverse_tcp
windows-meterpreter-reverse_tcp-192x168x16x182-30002.exe
PASSED SESSION CONTENT
Sanity_Win2016x64
192.168.16.182
VIRTUALSanity_APT_MSF_HOST
192.168.15.31
exploit/multi/handlerwindows/x64/meterpreter_bind_tcp
windows-x64-meterpreter_bind_tcp-192x168x16x182-30003.exe
PASSED SESSION CONTENT
Sanity_Win2016x64
192.168.16.182
VIRTUALSanity_APT_MSF_HOST
192.168.15.31
exploit/multi/handlerwindows/meterpreter_reverse_tcp
windows-meterpreter_reverse_tcp-192x168x16x182-30004.exe
PASSED SESSION CONTENT