Metasploit mailing list archives

Re: Encoding a payload within an exploit


From: John Nash <rootsecurityfreak () gmail com>
Date: Fri, 17 Sep 2010 16:31:08 +0530

i am using msfconsole

On Fri, Sep 17, 2010 at 4:28 PM, John Nash <rootsecurityfreak () gmail com>wrote:

I have selected an exploit and a payload (meterpreter/reverse_tcp)

but before launching the exploit on the victim i want to encode it with
shikata_ga_nai 5 times ...

i am not sure how do i do this?

JN

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: