[framework] Encoding a payload within an exploit

John Nash rootsecurityfreak at gmail.com
Fri Sep 17 06:01:08 CDT 2010

i am using msfconsole

On Fri, Sep 17, 2010 at 4:28 PM, John Nash <rootsecurityfreak at gmail.com>wrote:

> I have selected an exploit and a payload (meterpreter/reverse_tcp)
> but before launching the exploit on the victim i want to encode it with
> shikata_ga_nai 5 times ...
> i am not sure how do i do this?
> JN
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://dev.metasploit.com/pipermail/framework/attachments/20100917/be088b9d/attachment.html>

More information about the framework mailing list