[framework] Encoding a payload within an exploit

John Nash rootsecurityfreak at gmail.com
Fri Sep 17 04:01:08 PDT 2010


i am using msfconsole

On Fri, Sep 17, 2010 at 4:28 PM, John Nash <rootsecurityfreak at gmail.com>wrote:

> I have selected an exploit and a payload (meterpreter/reverse_tcp)
>
> but before launching the exploit on the victim i want to encode it with
> shikata_ga_nai 5 times ...
>
> i am not sure how do i do this?
>
> JN
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20100917/be088b9d/attachment.html>


More information about the framework mailing list