Metasploit mailing list archives
changing reverse_https ssl cert (Osman Pamuk)
From: anthony <kcrond () gmail com>
Date: Tue, 13 Sep 2011 22:53:01 +0800
Hi, Im interested to know more about the ssl cert used by the reverse_https as well is it a self signed cert? On Thu, Aug 25, 2011 at 1:00 AM, <framework-request () spool metasploit com> wrote:
Send framework mailing list submissions to framework () spool metasploit com To subscribe or unsubscribe via the World Wide Web, visit https://mail.metasploit.com/mailman/listinfo/framework or, via email, send a message with subject or body 'help' to framework-request () spool metasploit com You can reach the person managing the list at framework-owner () spool metasploit com When replying, please edit your Subject line so it is more specific than "Re: Contents of framework digest..." Today's Topics: 1. changing reverse_https ssl cert (Osman Pamuk) 2. How to use a custom exe as payload? (Richard Miles) ---------------------------------------------------------------------- Message: 1 Date: Wed, 24 Aug 2011 11:57:10 +0300 From: Osman Pamuk <osmanpamuk () gmail com> To: framework () spool metasploit com Subject: [framework] changing reverse_https ssl cert Message-ID: <CALgpqGAykBdpzmp8FvxW_-7FoKJ+aqUBRimuURWX+X2n76p=eg () mail gmail com> Content-Type: text/plain; charset="iso-8859-1" Hi, is there an easy way to change the ssl cert used by the reverse_https module? thanks, op -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20110824/f675477b/attachment-0001.html> ------------------------------ Message: 2 Date: Wed, 24 Aug 2011 10:14:05 -0500 From: Richard Miles <richard.k.miles () googlemail com> To: framework () spool metasploit com Subject: [framework] How to use a custom exe as payload? Message-ID: <CAFMma9OrXPKN6EL4XM9foZ_+3jZVfg1W+wbWM0F-W4Z2Y6kotQ () mail gmail com> Content-Type: text/plain; charset=UTF-8 Hi I want to use one of the metasploit exploits for example 'Adobe util.printf() Buffer Overflow' but I don't want to use a metasploit payload, instead I want to use a custom exe as a payload. There is a way / workaround to do it? Well, send a stage that connect to a webserver, download and execute is not a option here. I really want to use a own exe as payload. Thanks. ------------------------------ _______________________________________________ framework mailing list framework () spool metasploit com https://mail.metasploit.com/mailman/listinfo/framework End of framework Digest, Vol 43, Issue 18 *****************************************
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- changing reverse_https ssl cert (Osman Pamuk) anthony (Sep 13)