MSF_HOST NAME | MSF_HOST IP | MSF COMMIT VERSION | PCAP |
Sanity_APT_MSF_HOST | 192.168.15.31 | 1b2a024b03ab907d19a281f12c79eb607ea4279e | PCAP FILE |
TARGET | TYPE | MSF_HOST | MODULE | PAYLOAD | STATUS | SESSION |
Sanity_Win2016x64 192.168.16.182 | VIRTUAL | Sanity_APT_MSF_HOST 192.168.15.31 | exploit/multi/handler | windows/x64/meterpreter/bind_tcp windows-x64-meterpreter-bind_tcp-192x168x16x182-30001.exe | PASSED | SESSION CONTENT |
Sanity_Win2016x64 192.168.16.182 | VIRTUAL | Sanity_APT_MSF_HOST 192.168.15.31 | exploit/multi/handler | windows/meterpreter/reverse_tcp windows-meterpreter-reverse_tcp-192x168x16x182-30002.exe | PASSED | SESSION CONTENT |
Sanity_Win2016x64 192.168.16.182 | VIRTUAL | Sanity_APT_MSF_HOST 192.168.15.31 | exploit/multi/handler | windows/x64/meterpreter_bind_tcp windows-x64-meterpreter_bind_tcp-192x168x16x182-30003.exe | PASSED | SESSION CONTENT |
Sanity_Win2016x64 192.168.16.182 | VIRTUAL | Sanity_APT_MSF_HOST 192.168.15.31 | exploit/multi/handler | windows/meterpreter_reverse_tcp windows-meterpreter_reverse_tcp-192x168x16x182-30004.exe | PASSED | SESSION CONTENT |