Metasploit mailing list archives

Problem exploiting the MS DNS RPC Service (msdns_zonename)


From: hdm at metasploit.com (H D Moore)
Date: Thu, 7 Jun 2007 08:38:14 -0500

Either one works, the / determines whether the "single" or the "staged" 
version is used. windows/shell_reverse_tcp is a "single" with all the 
code in one buffer, while windows/shell/reverse_tcp sends the reverse 
connect code in the first stage, then downloads the shell stage at 
runtime.

-HD

On Thursday 07 June 2007 00:01, Patrick Webster wrote:
Also, don't you mean

set PAYLOAD windows/shell/reverse_tcp?



Current thread: