Metasploit mailing list archives

payloads


From: jameslee at cs.nmt.edu (James Lee)
Date: Wed, 4 Jun 2008 10:27:51 -0600

Whitney,

The find_port and find_tag payloads attempt to find the socket used
for the initial connection to the vulnerable service by enumerating
all possible connections and checking the port each connected from or
a special "tag" sent by the exploit, respectively.  Most exploits do
not support this because the socket is closed or for some other reason
the socket is not available at the time the payload runs.  Because of
this problem, exploit modules must explicitly identify their
compatibility with find payloads.

Hope this helps,
James


On Wed, Jun 4, 2008 at 8:28 AM,  <wbyoung at u.northwestern.edu> wrote:
When you `show payloads` in metasploit without an exploit selected,
there are many find_port and find_tag payloads available, but when you
select an exploit, these are no longer usable.

How do these get used (or how do I use them directly)?

- Whitney Young



_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework




Current thread: