Metasploit mailing list archives

dump exploit


From: vlad902 at gmail.com (Vlad902)
Date: Thu, 7 Oct 2004 15:06:51 -0700

On Thu,  7 Oct 2004 13:47:55 +0200, pteufl at sbox.tugraz.at
<pteufl at sbox.tugraz.at> wrote:
Hi all,
I have just read the documenation of the framework and played around with it.
I have a question concerning execution of the exploit. When the exploit is ready
(encoder, payload, exploit are set) the command "exploit" is used to execute the
exploit. Is there a way to dump the complete exploit to a file: e.g. as a c
array, or as a binary file?
The reason for asking: I am just developing a polymorphic shellcode detection
engine. I have already tested it with ADMmutate, Clet and JempiScodes. It would
be interesting how it performs on exploits generated by the framework. The
easiest way to do this would be to dump the exploit code to a file, which then
could be used as input for the engine.

Is there any option available to this or a something similar?

Not about packet dumps but you could use the "Tester exploit" (Which
is enabled when DebugLevel is 5) to get dumps of nops/raw/encoded/full
payload.

Thanks,
Peter

  vlad902



Current thread: