Metasploit mailing list archives
making your own payload
From: hdm at metasploit.com (H D Moore)
Date: Tue, 6 Dec 2005 12:09:28 -0600
Just a heads up - the new Meterpreter SAM module will be pushed out to msfupdate and the snapshot sometime this week. Vinnie is finishing up a few advisories first and wants to release it all at once. A few people have tested it (myself included) and it works great - just use Meterpreter as the payload, use -m Sam, and then execute the function to dump the local password hashes. On a side note, I recommend that people avoid win32_*_upexec payloads and use Meterpreter's Fs/Process modules instead. MSF3's new 'stdapi' module now includes all of the features of MSF2, plus some new ones (go skape!) :-) -HD On Tuesday 06 December 2005 11:25, mmiller at hick.org wrote:
Anyways, I attached the .c and .exe file in case anyone is interested. The reason why I wrote this is because I wanted make the root-shell/dump-hashes process a single shot attack.In the 3.0 version of the framework (and backported to the 2.x branch), we've integrated Vinnie Liu's sam juicer meterpreter module. T
Current thread:
- making your own payload pagvac (Dec 06)
- making your own payload H D Moore (Dec 06)
- making your own payload mmiller at hick.org (Dec 06)
- making your own payload pagvac (Dec 06)
- making your own payload mmiller at hick.org (Dec 06)
- making your own payload H D Moore (Dec 06)
- making your own payload Andre Ludwig (Dec 06)
- making your own payload Jerome Athias (Dec 06)
- making your own payload pagvac (Dec 06)