Metasploit mailing list archives
Windows Recv Tag Findsock Meterpreter payload
From: cbyrd01 at yahoo.com (Chris Byrd)
Date: Thu, 28 Apr 2005 07:56:12 -0700 (PDT)
In the documentation for Meterpreter, a payload is mentioned, win32_findrecv_ord_meterpreter, that has the ability to use the exploit socket for communication. This is intriguing to me, and I'd like to include it in an upcoming demonstration. However, I have been unable to select win32_findrecv_ord_meterpreter as a payload. I have tried with most win32 exploits. Any advice on how to use this payload would be greatly appreciated. Thanks, Chris __________________________________ Do you Yahoo!? Make Yahoo! your home page http://www.yahoo.com/r/hs
Current thread:
- Windows Recv Tag Findsock Meterpreter payload Chris Byrd (Apr 28)
- Windows Recv Tag Findsock Meterpreter payload vlad902 (Apr 28)
- <Possible follow-ups>
- Windows Recv Tag Findsock Meterpreter payload Chris Byrd (Apr 28)
- Windows Recv Tag Findsock Meterpreter payload vlad902 (Apr 28)
- Windows Recv Tag Findsock Meterpreter payload Chris Byrd (Apr 28)
- Windows Recv Tag Findsock Meterpreter payload H D Moore (Apr 28)