Home page logo
/

metasploit logo Metasploit mailing list archives

Re: WinExec payload?
From: Jose Selvi <jselvi () pentester es>
Date: Wed, 18 May 2011 08:37:26 +0200

Did you try adding a breakpoint in the payload?
You can do it by editing the .rb file.
It should work...

El 18/05/11 08:33, Jun Koi escribió:
On Wed, May 18, 2011 at 2:00 PM, Jose Selvi <jselvi () pentester es> wrote:
Are you using a debugger with the service you're exploiting?

yes, i do.

Maybe you're not catching the interruption.

i dont think so, because that should not happen.

thanks,
J

-- 
Jose Selvi.
Security Technical Consultant
CISA, CISSP, CNAP, GCIH, GPEN

http://www.pentester.es

SANS Mentor in Madrid (Spain). September 23 - November 25
SEC560: Network Penetration Testing and Ethical Hacking
http://www.sans.org/mentor/details.php?nid=24133
http://www.pentester.es/2010/12/nuevo-grupo-y-descuento-para-network.html
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault