Metasploit mailing list archives
Windows Recv Tag Findsock Meterpreter payload
From: vlad902 at gmail.com (vlad902)
Date: Thu, 28 Apr 2005 08:13:36 -0700
On 4/28/05, Chris Byrd <cbyrd01 at yahoo.com> wrote:
In the documentation for Meterpreter, a payload is mentioned, win32_findrecv_ord_meterpreter, that has the ability to use the exploit socket for communication. This is intriguing to me, and I'd like to include it in an upcoming demonstration. However, I have been unable to select win32_findrecv_ord_meterpreter as a payload. I have tried with most win32 exploits. Any advice on how to use this payload would be greatly appreciated. Thanks, Chris __________________________________ Do you Yahoo!? Make Yahoo! your home page http://www.yahoo.com/r/hs
findsock payloads are only available with some exploits, and ordinals ones less so... If it doesn't work use another payload or use another exploit. -vlad902
Current thread:
- Windows Recv Tag Findsock Meterpreter payload Chris Byrd (Apr 28)
- Windows Recv Tag Findsock Meterpreter payload vlad902 (Apr 28)
- <Possible follow-ups>
- Windows Recv Tag Findsock Meterpreter payload Chris Byrd (Apr 28)
- Windows Recv Tag Findsock Meterpreter payload vlad902 (Apr 28)
- Windows Recv Tag Findsock Meterpreter payload Chris Byrd (Apr 28)
- Windows Recv Tag Findsock Meterpreter payload H D Moore (Apr 28)