Metasploit mailing list archives
Re: WinExec payload?
From: Jose Selvi <jselvi () pentester es>
Date: Wed, 18 May 2011 08:37:26 +0200
Did you try adding a breakpoint in the payload? You can do it by editing the .rb file. It should work... El 18/05/11 08:33, Jun Koi escribió:
On Wed, May 18, 2011 at 2:00 PM, Jose Selvi <jselvi () pentester es> wrote:Are you using a debugger with the service you're exploiting?yes, i do.Maybe you're not catching the interruption.i dont think so, because that should not happen. thanks, J
-- Jose Selvi. Security Technical Consultant CISA, CISSP, CNAP, GCIH, GPEN http://www.pentester.es SANS Mentor in Madrid (Spain). September 23 - November 25 SEC560: Network Penetration Testing and Ethical Hacking http://www.sans.org/mentor/details.php?nid=24133 http://www.pentester.es/2010/12/nuevo-grupo-y-descuento-para-network.html _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- WinExec payload? Jun Koi (May 17)
- Re: WinExec payload? Jose Selvi (May 17)
- Re: WinExec payload? Jun Koi (May 17)
- Re: WinExec payload? Jose Selvi (May 17)
- Re: WinExec payload? Jun Koi (May 17)
- Re: WinExec payload? Abuse007 (May 18)
- Re: WinExec payload? Peter Van Eeckhoutte (May 18)
- Re: WinExec payload? Jun Koi (May 18)
- Re: WinExec payload? Peter Van Eeckhoutte (May 18)
- Re: WinExec payload? Jose Selvi (May 17)