Metasploit mailing list archives
Re: Metasploit Framework 3.3 Released!
From: Jeffs <jeffs () speakeasy net>
Date: Thu, 19 Nov 2009 22:57:11 -0500
That looks like a great new addition! Can you give a semi-working example of the syntax of using the -x parameter in the msfencode when used with msfpayload in the usual way?
I've tried various permutations of the syntax and can't get it to recognize notepad.exe as the "carrier".
Thanks! HD Moore wrote: The payload encoding library can now embed Metasploit payloads into arbitrary executables. The -x parameter to msfencode allows an arbitrary executable to be used as a vector for a Metasploit payload. This significantly reduces the impact of anti-virus tests during penetration tests and allows the use of familiar executables in social engineering endeavors. _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Metasploit Framework 3.3 Released! HD Moore (Nov 17)
- Re: Metasploit Framework 3.3 Released! MC (Nov 17)
- Re: Metasploit Framework 3.3 Released! ArcSighter Elite (Nov 17)
- Re: Metasploit Framework 3.3 Released! Moshe Ben Abu (Nov 17)
- Re: Metasploit Framework 3.3 Released! David Sopas (Nov 18)
- Re: Metasploit Framework 3.3 Released! Jeffs (Nov 19)
- Re: Metasploit Framework 3.3 Released! HD Moore (Nov 19)
- Re: Metasploit Framework 3.3 Released! go . hawaii (Nov 19)
- Re: Metasploit Framework 3.3 Released! HD Moore (Nov 19)