November 11, 2011 at 6:58 pm #7027
i have a problem witn metasploit i dont wich of payloads is best for my exploit ( i know the server vulnerabilite and i sure about my expliot )and when i use “show payloads” command i see a lot of compatible payloads please help me to find the best payload
November 11, 2011 at 7:08 pm #43613mambruParticipant
The “best” payload to use will depend on you scenario.
November 11, 2011 at 9:32 pm #4361424772433Participant
Try each one and see which works best for you! That’s part of the fun of Metasploit. For each one that doesn’t work try to find out why!
November 12, 2011 at 2:24 am #43615BillVParticipant
As previously mentioned we don’t know your environment, or your target for that matter.
If it’s within a local lab environment, targeting a Windows system, give the reverse meterpreter a try…
set payload windows/meterpreter/reverse_tcp
set lport 8888
November 12, 2011 at 7:57 pm #43616
oh steve are you kiding!! it has hundred compatible payload and it takes a lot of time for me
November 12, 2011 at 11:08 pm #43617
November 12, 2011 at 11:34 pm #43618AnonymousParticipant
On Windows, a meterpreter is always better because all windows post modules support it (plus tons of features). It also communicates in SSL, so that adds a bit more stealth. On Linux though, it’s a different story, honestly you’re probably better off with a non-meterpreter shell, because the Linux meterpreter isn’t as good as the windows one.
reverse vs bind… come to think about it, I almost never use bind these days on a machine behind a firewall. But people do use bind shells.
By the way, when you select an exploit, and do “show payloads” — that will only show all the payloads compatible with that particular exploit. If you’re testing a web app exploit, keep in mind php/exec might not return an output (even though the command ran successfully).
If you’re still clueless about which payload to use, just use a reverse meterpreter like everybody else has been recommending.
Lastly, perhaps you should consider asking Metasploit questions on #metasploit in freenode, so the actual metasploit dev team can answer your questions more quickly.
And yes… I did sign up for an account here just to answer your question.
November 13, 2011 at 6:16 am #43619
Thank you msfsinn3r your info was very useful for me
my sever is windows server 2003
and thanks alot
January 29, 2012 at 8:50 am #43620nytfoxParticipant
btw you can use search commend to get selected exploits , like “search smb” . try it and lemme know 🙂
You must be logged in to reply to this topic.