Metasploit mailing list archives

Payloads confusion


From: msairam at intoto.com (M P Sairam)
Date: Fri, 20 Jun 2008 12:33:48 +0530

Depending on the Exploit Category and Target Type the payload is choosen 
from the generic/shell_bind_tcp or generic/shell_reverse_tcp .

For Example:
        For a Windows based SMB Exploit, the target is an Windows XP on 
x86 arch, when you select payload as  generic/shell_bind_tcp it 
automatically selects windows/shell_bind_tcp.

       Similarly, for a solaris based samba exploit if you choose target 
as solaris on ppc architecture, and you selected payload as 
generic/shell_bind_tcp then it will load the payload as 
solaris/ppc/shell_bind_tcp. For the same Exploit if you choose target as 
solaris on x86 architecture, then the same payload will load 
solaris/x86/shell_bind_tcp.

Regards,
sairam
   
Muhammad Rizwan wrote:
Hi,

I have following question to ask.

1. Against most of the exploits, almost same payloads are shown i.e. 
generic/shell_bind_tcp,   
    generic/shell_reverse_tcp etc. I am confusing why even smb, dcom, 
iis etc have same kind of payloads?


Thanks in advance
 
Regards,
Muhammad Rizwan

Send instant messages to your online friends 
http://uk.messenger.yahoo.com
------------------------------------------------------------------------

_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework
  


********************************************************************************
This email message (including any attachments) is for the sole use of the intended recipient(s) 
and may contain confidential, proprietary and privileged information. Any unauthorized review, 
use, disclosure or distribution is prohibited. If you are not the intended recipient, 
please immediately notify the sender by reply email and destroy all copies of the original message. 
Thank you.
 
Intoto Inc. 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20080620/d35be69d/attachment.htm>


Current thread: