Home page logo

metasploit logo Metasploit mailing list archives

Re: input custom .exe to msf
From: Terrence <secretpackets () gmail com>
Date: Wed, 14 Apr 2010 02:47:09 -0400

you could aslo do this with a meterpreter script. This may be more
useful if you want yo asses countermeasures beforehand.

On Tue, Apr 13, 2010 at 22:38, scriptjunkie
<scriptjunkie1 () googlemail com> wrote:
On 03/28/10 16:23, Jeffs wrote:
Is there a method in the msf project to convert and then deliver custom
binaries not included in the project?  For example, my custom binary,
delivered and executed the way a reverse shell binary is delivered and
executed (assuming my binary is capable of reverse connect)

Is the project modular enough to do this without much surgery on the
core or are their methods already installed?


You probably want to use the windows/download_exec or one of the upexec
shellcodes. (on msfconsole try "search upexec" to see those modules)

The reverse shell and most other simple payloads are delivered in-memory
for most exploits, and a generic exe cannot be delivered this way (needs
linking, etc) unless you rewrite it to be a dll and use a reflective dll
loader. ("search dllinject")


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]