Jump to content

Metasploit buffer overflow detected by AV


Recommended Posts

hi guys i need some help on using metasploit,

i am exploiting a vulnerable dup scout login buffer overflow to cause buffer overflow on my virtual window 10 machine and when using this exploit it make use of windows/meterpreter/reverse_tcp for the payload by default to create a meterpreter session and it successful created with anti virus off. 

so i need to make it undetectable by anti virus, i tried to create a payload with msfvenom using windows/meterpreter/reverse_tcp to make it undetectable by encoding or maybe wrapper 
(havent fully make it undetectable) 

Then when exploiting this vulnerabilities i want to be able to upload and execute the payload i created to the target by setting the payload as windows/download_exec or windows/upexec/reverse_tcp inside the exploit itself but i cant seem to make it workable
So the idea is buffer overflow exploit that will sent created exploit to target machine >> use multi handler to create a connection back
i tried to upload a normal text file using windows/download_exec and windows/upexec/reverse_tcp but i could not find that text file in the target machine so it did not get uploaded to the target

Am i doing anything wrong? 
Or is there any other ways when performing the buffer overflow i can sent the created payload to target or make buffer overflow undetectable?. 

Pls enlighten me thank you very much

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
  • Create New...