i am using Metasploit but i have a problem with selecting those payloads.. how can i determine the appropriate payload with the selected exploit.
please help me
thanks
Metasploit
For starters, the category clearly says the following:
*moved*
Anyway, the payload is what is used after the exploit has (usually) gained some kind of access to the system. One example is to combine an exploit that lets you execute code on a remote machine, and have it listen to a port so that you gain shell access, or maybe run a VNC server on it or whatever.
Think of payload as the bomb you drop when you've kicked down the door.
DON'T post new tutorials here! Please use the "Pending Submissions" board so the staff can review them first.
*moved*
Anyway, the payload is what is used after the exploit has (usually) gained some kind of access to the system. One example is to combine an exploit that lets you execute code on a remote machine, and have it listen to a port so that you gain shell access, or maybe run a VNC server on it or whatever.
Think of payload as the bomb you drop when you've kicked down the door.
"The best place to hide a tree, is in a forest"