Metasploit mailing list archives

Windows Recv Tag Findsock Meterpreter payload


From: cbyrd01 at yahoo.com (Chris Byrd)
Date: Thu, 28 Apr 2005 07:56:12 -0700 (PDT)

In the documentation for Meterpreter, a payload is
mentioned, win32_findrecv_ord_meterpreter, that has
the ability to use the exploit socket for
communication.  This is intriguing to me, and I'd like
to include it in an upcoming demonstration.

However, I have been unable to select
win32_findrecv_ord_meterpreter as a payload. I have
tried with most win32 exploits.  Any advice on how to
use this payload would be greatly appreciated.

Thanks,
Chris



                
__________________________________ 
Do you Yahoo!? 
Make Yahoo! your home page 
http://www.yahoo.com/r/hs



Current thread: