Metasploit mailing list archives

Re: Metasploit Framework 3.3 Released!


From: Jeffs <jeffs () speakeasy net>
Date: Thu, 19 Nov 2009 22:57:11 -0500

That looks like a great new addition! Can you give a semi-working example of the syntax of using the -x parameter in the msfencode when used with msfpayload in the usual way?

I've tried various permutations of the syntax and can't get it to recognize notepad.exe as the "carrier".

Thanks!


HD Moore wrote:

The payload encoding library can now embed Metasploit payloads into
arbitrary executables. The -x parameter to msfencode allows an arbitrary
executable to be used as a vector for a Metasploit payload. This
significantly reduces the impact of anti-virus tests during penetration
tests and allows the use of familiar executables in social engineering
endeavors.

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: