Metasploit mailing list archives
Re: encoded payload question
From: HD Moore <hdm () metasploit com>
Date: Mon, 14 Dec 2009 19:26:21 -0600
On 12/14/2009 7:01 PM, Jeffs wrote:
Cannot find the Msf::Util::EXE class anywhere in the online documentation.
The API docs are a little out of date -- this class was a recent addition. Check the source under lib/msf/util.rb for a complete reference. To encode a payload with a specific payload, take a look at the msfencode source code:
shellcode = "\xcc"
badchars = "\x00"
enc = framework.encoders.create("x86/shikata_ga_nai")
enc.datastore.import_options_from_s("BLAH=BOOM BLAH2=BOOM2", " ")
out = enc.encode(shellcode, badchars)
-HD
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Re: exploit -j command, (continued)
- Re: exploit -j command egypt (Dec 10)
- possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- Re: possible bug in MSFCLI and msfencode? HD Moore (Dec 10)
- Re: possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- Re: possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- Re: possible bug in MSFCLI and msfencode? HD Moore (Dec 11)
- Re: exploit -j command HD Moore (Dec 10)
- encoded payload question Jeffs (Dec 13)
- Re: encoded payload question MC (Dec 14)
- Re: encoded payload question Jeffs (Dec 14)
- Re: encoded payload question HD Moore (Dec 14)
