Metasploit mailing list archives
Re: input custom .exe to msf
From: Terrence <secretpackets () gmail com>
Date: Wed, 14 Apr 2010 02:47:09 -0400
you could aslo do this with a meterpreter script. This may be more useful if you want yo asses countermeasures beforehand. On Tue, Apr 13, 2010 at 22:38, scriptjunkie <scriptjunkie1 () googlemail com> wrote:
On 03/28/10 16:23, Jeffs wrote:Is there a method in the msf project to convert and then deliver custom binaries not included in the project? For example, my custom binary, delivered and executed the way a reverse shell binary is delivered and executed (assuming my binary is capable of reverse connect) Is the project modular enough to do this without much surgery on the core or are their methods already installed? Thanks. _______________________________________________ https://mail.metasploit.com/mailman/listinfo/frameworkYou probably want to use the windows/download_exec or one of the upexec shellcodes. (on msfconsole try "search upexec" to see those modules) The reverse shell and most other simple payloads are delivered in-memory for most exploits, and a generic exe cannot be delivered this way (needs linking, etc) unless you rewrite it to be a dll and use a reflective dll loader. ("search dllinject") _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Re: input custom .exe to msf scriptjunkie (Apr 13)
- Re: input custom .exe to msf Terrence (Apr 13)