Metasploit mailing list archives

Windows Recv Tag Findsock Meterpreter payload


From: vlad902 at gmail.com (vlad902)
Date: Thu, 28 Apr 2005 08:13:36 -0700

On 4/28/05, Chris Byrd <cbyrd01 at yahoo.com> wrote:
In the documentation for Meterpreter, a payload is
mentioned, win32_findrecv_ord_meterpreter, that has
the ability to use the exploit socket for
communication.  This is intriguing to me, and I'd like
to include it in an upcoming demonstration.

However, I have been unable to select
win32_findrecv_ord_meterpreter as a payload. I have
tried with most win32 exploits.  Any advice on how to
use this payload would be greatly appreciated.

Thanks,
Chris


__________________________________
Do you Yahoo!?
Make Yahoo! your home page
http://www.yahoo.com/r/hs


findsock payloads are only available with some exploits, and ordinals
ones less so... If it doesn't work use another payload or use another
exploit.

-vlad902



Current thread: