Metasploit mailing list archives
Re: encoded payload question
From: Jeffs <jeffs () speakeasy net>
Date: Mon, 14 Dec 2009 20:01:32 -0500
Cannot find the Msf::Util::EXE class anywhere in the online documentation.This is for a reverse connect payload and the method described below does not seem to work.
Receiving error: Exploit failed: undefined method '_import_extra_options' for #<Msf::EncodedPayload:...."
There is no way to specify the encoder in here?@msf_payload = Msf::Util::EXE.to_win32pe(framework,payload.encoded) <------------------- can't specify here?
MC wrote:
Jeffs, Yes you can. # Set the options for the bind_shell buf = Msf::Simple::Payload.generate_simple(payload, { 'OptionStr' => "LPORT=#{port}", 'Encoder' => 'x86/shikata_ga_nai', 'Format' => 'raw' }) # Build out our binary. data = Msf::Util::EXE.to_win32pe($framework, buf) ~mc On Mon, 14 Dec 2009, Jeffs wrote:When writing an .rb module I can use: @msf_payload = Msf::Util::EXE.to_win32pe(framework,payload.encoded)to create the payload. But is there a way to specify the encoding method and/or options here?Thanks. _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- exploit -j command, (continued)
- exploit -j command Jeffs (Dec 10)
- Re: exploit -j command egypt (Dec 10)
- possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- Re: possible bug in MSFCLI and msfencode? HD Moore (Dec 10)
- Re: possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- Re: possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- Re: possible bug in MSFCLI and msfencode? HD Moore (Dec 11)
- Re: exploit -j command HD Moore (Dec 10)
- encoded payload question Jeffs (Dec 13)
- Re: encoded payload question MC (Dec 14)
- Re: encoded payload question Jeffs (Dec 14)
- Re: encoded payload question HD Moore (Dec 14)