Metasploit mailing list archives
Re: input custom .exe to msf
From: scriptjunkie <scriptjunkie1 () googlemail com>
Date: Tue, 13 Apr 2010 22:38:28 -0400
On 03/28/10 16:23, Jeffs wrote:
Is there a method in the msf project to convert and then deliver custom binaries not included in the project? For example, my custom binary, delivered and executed the way a reverse shell binary is delivered and executed (assuming my binary is capable of reverse connect) Is the project modular enough to do this without much surgery on the core or are their methods already installed? Thanks. _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
You probably want to use the windows/download_exec or one of the upexec
shellcodes. (on msfconsole try "search upexec" to see those modules)
The reverse shell and most other simple payloads are delivered in-memory
for most exploits, and a generic exe cannot be delivered this way (needs
linking, etc) unless you rewrite it to be a dll and use a reflective dll
loader. ("search dllinject")
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Re: input custom .exe to msf scriptjunkie (Apr 13)
- Re: input custom .exe to msf Terrence (Apr 13)
