Metasploit mailing list archives

Re: Problem with Payload Configuration


From: Stephen Haywood <stephen () averagesecurityguy info>
Date: Mon, 13 Feb 2012 08:12:02 -0500

There is also an excellent metasploit book. I found it very helpful in
learning to use metasploit.
http://www.amazon.com/Metasploit-Penetration-Testers-David-Kennedy/dp/159327288X

On Mon, Feb 13, 2012 at 7:28 AM, jambunathan sadasivamiyer <
jamshuttle77 () gmail com> wrote:

hi
with following  options,
msf.> use payload/windows/shell/reverse_tcp_dns

i am able to generate the payload as sequence of hex humbers
can anybody tell me how to use this payload.

i just browsed following link and others, but if i could get a possible
example, it could be easy for understanding.

http://www.metasploit.com/modules/payload/windows/exec

thanks
jam

On Mon, Feb 13, 2012 at 4:36 PM, haZard0us <hazard0us.pt () gmail com> wrote:


Should i suggest windows/shell/reverse_tcp_dns as a payload? (or
meterpreter)

:)

On Feb 13, 2012, at 3:58 AM, Isilme OrphousV wrote:

I'm in a LAN and I don't have permission to the router. In order to make
my machine accessible to the WAN, I've got to adopt the method of dynamic
domain name resolution to break the barrier. Namely, for example, the
domain name TEST.net is in the possession of mine, through which anyone
on the Internet could access my computer, which is in a LAN. How should I
configure my payload (a shell_reverse_tcp in this case) and handler when I
can't specify an IP address but a domain name?

Hope to have got myself across.THX in advance!
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework



_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework




--

Jambu

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework




-- 
Stephen Haywood
Information Security Consultant
CISSP, GPEN, OSCP
T: @averagesecguy
W: averagesecurityguy.info
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: