Metasploit mailing list archives

cmd/windows/reverse_perl not being executed.


From: Danux <danuxx () gmail com>
Date: Thu, 4 Mar 2010 15:06:07 -0600

Hi,

I am using this payload cmd/windows/reverse_perl encoded (150 bytes)
since I have only  268 bytes to place my shellcode.
But I am not getting any reverse shell, I debugged the process and the
shellcode is loaded in memory and decoded without problems.

I also install perl in the Windows Vista 32-bit box but still no shell back.

Is there any kind of requirement for this payload to succeed?

-- 
Daniel Regalado aka Danux
Hacker Wanna Be de Nezahualcoyotl

www.macula-group.com
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: