Metasploit mailing list archives
reverse TCP stager payload
From: black.gal007 at gmail.com (black gal)
Date: Tue, 11 Sep 2007 12:26:29 +0530
Hi All This time i tried same exploit "ms06_001_wmf_setabortproc" with different payload Windows Executable Download and Execute, Reverse TCP Stager on unpatched windows XP home edition. As a result it openend wmf file on machine..but i m not able to find out if the exploit worked or not?? -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070911/87059801/attachment.htm>
Current thread:
- reverse TCP stager payload black gal (Sep 09)
- reverse TCP stager payload H D Moore (Sep 09)
- reverse TCP stager payload black gal (Sep 10)
- reverse TCP stager payload black gal (Sep 10)
- reverse TCP stager payload Patrick Webster (Sep 11)
- reverse TCP stager payload Suman Saini (Sep 11)
- reverse TCP stager payload Patrick Webster (Sep 11)
- reverse TCP stager payload black gal (Sep 11)
- reverse TCP stager payload black gal (Sep 11)
- reverse TCP stager payload H D Moore (Sep 09)