Theoneguy Posted December 15, 2017 Share Posted December 15, 2017 hi guys i need some help on using metasploit, i am exploiting a vulnerable dup scout login buffer overflow to cause buffer overflow on my virtual window 10 machine and when using this exploit it make use of windows/meterpreter/reverse_tcp for the payload by default to create a meterpreter session and it successful created with anti virus off. so i need to make it undetectable by anti virus, i tried to create a payload with msfvenom using windows/meterpreter/reverse_tcp to make it undetectable by encoding or maybe wrapper (havent fully make it undetectable) Then when exploiting this vulnerabilities i want to be able to upload and execute the payload i created to the target by setting the payload as windows/download_exec or windows/upexec/reverse_tcp inside the exploit itself but i cant seem to make it workable So the idea is buffer overflow exploit that will sent created exploit to target machine >> use multi handler to create a connection back i tried to upload a normal text file using windows/download_exec and windows/upexec/reverse_tcp but i could not find that text file in the target machine so it did not get uploaded to the target Am i doing anything wrong? Or is there any other ways when performing the buffer overflow i can sent the created payload to target or make buffer overflow undetectable?. Pls enlighten me thank you very much Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.