![]() Ignore known-fragile devices - Ignore devices that are known to have issues with automated exploitation, such as printers, industrial controllers, or other embedded devices.Excluded Addresses - A list of IP addresses to exclude from targeting.Excluded Ports - Defines the specific ports you want to exclude from exploitation.Included Ports - Defines the specific ports you want to target for exploitation.The higher the application evasion level, the more evasion techniques are applied. Application Evasion - Adjusts application-specific evasion options for exploits involving DCERPC, SMB and HTTP.High - Sends small TCP packets and inserts delays between them.Low - Inserts delays between TCP packets.Transport Evasion - Choose from the following transport evasion levels:.Timeout in Minutes - Defines the number of minutes an exploit waits before it times out.Concurrent Exploits - Specifies the number of exploit attempts you want to launch at one time.Auto Launch Macro - Specifies the macro that you want to run during post-exploitation.Listener Host - Defines the IP address you want to connect back to. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |