Metasploit

No explicit questions like "how do I hack xxx.com" please!
Post Reply
User avatar
shan75
On the way to fame!
On the way to fame!
Posts: 32
Joined: 03 Dec 2009, 17:00
14
Location: india
Contact:

Metasploit

Post by shan75 »

i am using Metasploit but i have a problem with selecting those payloads.. how can i determine the appropriate payload with the selected exploit.

please help me

thanks

User avatar
ayu
Staff
Staff
Posts: 8109
Joined: 27 Aug 2005, 16:00
18
Contact:

Post by ayu »

For starters, the category clearly says the following:
DON'T post new tutorials here! Please use the "Pending Submissions" board so the staff can review them first.

*moved*

Anyway, the payload is what is used after the exploit has (usually) gained some kind of access to the system. One example is to combine an exploit that lets you execute code on a remote machine, and have it listen to a port so that you gain shell access, or maybe run a VNC server on it or whatever.

Think of payload as the bomb you drop when you've kicked down the door.
"The best place to hide a tree, is in a forest"

Post Reply