Metasploit mailing list archives
Re: encoded payload question
From: MC <mc () metasploit com>
Date: Mon, 14 Dec 2009 06:19:52 -0600 (CST)
Jeffs, Yes you can. # Set the options for the bind_shell buf = Msf::Simple::Payload.generate_simple(payload, { 'OptionStr' => "LPORT=#{port}", 'Encoder' => 'x86/shikata_ga_nai', 'Format' => 'raw' }) # Build out our binary. data = Msf::Util::EXE.to_win32pe($framework, buf) ~mc On Mon, 14 Dec 2009, Jeffs wrote:
When writing an .rb module I can use: @msf_payload = Msf::Util::EXE.to_win32pe(framework,payload.encoded)to create the payload. But is there a way to specify the encoding method and/or options here?Thanks. _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Re: patchup prefix, (continued)
- Re: patchup prefix HD Moore (Dec 10)
- exploit -j command Jeffs (Dec 10)
- Re: exploit -j command egypt (Dec 10)
- possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- Re: possible bug in MSFCLI and msfencode? HD Moore (Dec 10)
- Re: possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- Re: possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- Re: possible bug in MSFCLI and msfencode? HD Moore (Dec 11)
- Re: exploit -j command HD Moore (Dec 10)
- encoded payload question Jeffs (Dec 13)
- Re: encoded payload question MC (Dec 14)
- Re: encoded payload question Jeffs (Dec 14)
- Re: encoded payload question HD Moore (Dec 14)