Metasploit mailing list archives
payloads
From: jameslee at cs.nmt.edu (James Lee)
Date: Wed, 4 Jun 2008 10:27:51 -0600
Whitney, The find_port and find_tag payloads attempt to find the socket used for the initial connection to the vulnerable service by enumerating all possible connections and checking the port each connected from or a special "tag" sent by the exploit, respectively. Most exploits do not support this because the socket is closed or for some other reason the socket is not available at the time the payload runs. Because of this problem, exploit modules must explicitly identify their compatibility with find payloads. Hope this helps, James On Wed, Jun 4, 2008 at 8:28 AM, <wbyoung at u.northwestern.edu> wrote:
When you `show payloads` in metasploit without an exploit selected, there are many find_port and find_tag payloads available, but when you select an exploit, these are no longer usable. How do these get used (or how do I use them directly)? - Whitney Young _______________________________________________ http://spool.metasploit.com/mailman/listinfo/framework
Current thread:
- payloads wbyoung at u.northwestern.edu (Jun 04)
- payloads James Lee (Jun 04)