Skip to Main Content
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
book

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

by James C Foster
April 2005
Intermediate to advanced content levelIntermediate to advanced
700 pages
20h 39m
English
Syngress
Content preview from Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
To generate the payload, we simply specify the value of any variables we wish to
change along with the output format.The C option outputs the payload to be included
in the C programming language while the P option outputs for Perl scripts.The final
option, R, outputs the payload in raw format that should be redirected to a file or piped
to msfencode. Because we will be encoding the payload, we will need the payload in
raw format, so we save the payload to a file. We will also specify shell to listen on port
31337. Figure 12.33 exhibits all three output formats.
Figure 12.33 Generating the Payload
Because msfpayload does not avoid bad characters, the C- ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

32/64-Bit 80x86 Assembly Language Architecture

32/64-Bit 80x86 Assembly Language Architecture

James Leiterman

Publisher Resources

ISBN: 9781597490054