Metasploit mailing list archives

Re: encoded payload question


From: Jeffs <jeffs () speakeasy net>
Date: Mon, 14 Dec 2009 20:01:32 -0500

Cannot find the Msf::Util::EXE class anywhere in the online documentation.

This is for a reverse connect payload and the method described below does not seem to work.

Receiving error: Exploit failed: undefined method '_import_extra_options' for #<Msf::EncodedPayload:...."

There is no way to specify the encoder in here?

@msf_payload = Msf::Util::EXE.to_win32pe(framework,payload.encoded) <------------------- can't specify here?

MC wrote:
Jeffs,
 Yes you can.

    # Set the options for the bind_shell
    buf = Msf::Simple::Payload.generate_simple(payload,
        {
            'OptionStr' => "LPORT=#{port}",
            'Encoder'   => 'x86/shikata_ga_nai',
            'Format'    => 'raw'
        })

    # Build out our binary.
    data = Msf::Util::EXE.to_win32pe($framework, buf)


~mc

On Mon, 14 Dec 2009, Jeffs wrote:

When writing an .rb module I can use:

@msf_payload = Msf::Util::EXE.to_win32pe(framework,payload.encoded)

to create the payload. But is there a way to specify the encoding method and/or options here?

Thanks.
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework




_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: