Metasploit mailing list archives

Re: encoded payload question


From: HD Moore <hdm () metasploit com>
Date: Mon, 14 Dec 2009 19:26:21 -0600

On 12/14/2009 7:01 PM, Jeffs wrote:
Cannot find the Msf::Util::EXE class anywhere in the online documentation.

The API docs are a little out of date -- this class was a recent addition. Check the source under lib/msf/util.rb for a complete reference. To encode a payload with a specific payload, take a look at the msfencode source code:

shellcode = "\xcc"
badchars  = "\x00"

enc = framework.encoders.create("x86/shikata_ga_nai")
enc.datastore.import_options_from_s("BLAH=BOOM BLAH2=BOOM2", " ")
out = enc.encode(shellcode, badchars)

-HD
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: