Home page logo
/

metasploit logo Metasploit mailing list archives

dump exploit
From: pteufl at sbox.tugraz.at (pteufl at sbox.tugraz.at)
Date: Thu, 7 Oct 2004 13:47:55 +0200

Hi all,
I have just read the documenation of the framework and played around with it.
I have a question concerning execution of the exploit. When the exploit is ready
(encoder, payload, exploit are set) the command "exploit" is used to execute the
exploit. Is there a way to dump the complete exploit to a file: e.g. as a c
array, or as a binary file?
The reason for asking: I am just developing a polymorphic shellcode detection
engine. I have already tested it with ADMmutate, Clet and JempiScodes. It would
be interesting how it performs on exploits generated by the framework. The
easiest way to do this would be to dump the exploit code to a file, which then
could be used as input for the engine.

Is there any option available to this or a something similar?

Thanks,
Peter




  By Date           By Thread  

Current thread:
  • dump exploit pteufl at sbox.tugraz.at (Oct 07)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]