Metasploit mailing list archives

Re: Encoding a payload within an exploit


From: egypt () metasploit com
Date: Fri, 17 Sep 2010 10:47:35 -0600

Encoding happens automatically.  The framework defaults to using
shikata for x86 payloads and, if that fails, will try other encoders.
There's currently no way to encode multiple times except when
generating payloads outside of an exploit.

Hope this helped,
egypt

On Fri, Sep 17, 2010 at 5:01 AM, John Nash <rootsecurityfreak () gmail com> wrote:
i am using msfconsole

On Fri, Sep 17, 2010 at 4:28 PM, John Nash <rootsecurityfreak () gmail com>
wrote:

I have selected an exploit and a payload (meterpreter/reverse_tcp)
but before launching the exploit on the victim i want to encode it with
shikata_ga_nai 5 times ...
i am not sure how do i do this?
JN

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: