Metasploit mailing list archives

changing reverse_https ssl cert (Osman Pamuk)


From: anthony <kcrond () gmail com>
Date: Tue, 13 Sep 2011 22:53:01 +0800

Hi,

Im interested to know more about the ssl cert used by the reverse_https as well
is it a self signed cert?

On Thu, Aug 25, 2011 at 1:00 AM,
<framework-request () spool metasploit com> wrote:
Send framework mailing list submissions to
       framework () spool metasploit com

To subscribe or unsubscribe via the World Wide Web, visit
       https://mail.metasploit.com/mailman/listinfo/framework
or, via email, send a message with subject or body 'help' to
       framework-request () spool metasploit com

You can reach the person managing the list at
       framework-owner () spool metasploit com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of framework digest..."


Today's Topics:

  1. changing reverse_https ssl cert (Osman Pamuk)
  2. How to use a custom exe as payload? (Richard Miles)


----------------------------------------------------------------------

Message: 1
Date: Wed, 24 Aug 2011 11:57:10 +0300
From: Osman Pamuk <osmanpamuk () gmail com>
To: framework () spool metasploit com
Subject: [framework] changing reverse_https ssl cert
Message-ID:
       <CALgpqGAykBdpzmp8FvxW_-7FoKJ+aqUBRimuURWX+X2n76p=eg () mail gmail com>
Content-Type: text/plain; charset="iso-8859-1"

Hi,
is there an easy way to change the ssl cert used by the reverse_https
module?
thanks,

op
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20110824/f675477b/attachment-0001.html>

------------------------------

Message: 2
Date: Wed, 24 Aug 2011 10:14:05 -0500
From: Richard Miles <richard.k.miles () googlemail com>
To: framework () spool metasploit com
Subject: [framework] How to use a custom exe as payload?
Message-ID:
       <CAFMma9OrXPKN6EL4XM9foZ_+3jZVfg1W+wbWM0F-W4Z2Y6kotQ () mail gmail com>
Content-Type: text/plain; charset=UTF-8

Hi

I want to use one of the metasploit exploits for example 'Adobe
util.printf() Buffer Overflow' but I don't want to use a metasploit
payload, instead I want to use a custom exe as a payload. There is a
way / workaround to do it?

Well, send a stage that connect to a webserver, download and execute
is not a option here. I really want to use a own exe as payload.


Thanks.


------------------------------

_______________________________________________
framework mailing list
framework () spool metasploit com
https://mail.metasploit.com/mailman/listinfo/framework


End of framework Digest, Vol 43, Issue 18
*****************************************

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: